密码技术的核心是密码算法。
Cryptography algorithm is the core of cryptography technology.
密码技术被广泛应用于信息安全领域。
Cryptography is utilized widely in the field of information security.
这里就使用了密码技术。
密码技术提供网络信息安全的解决途径。
第一代版权保护是密码技术和数字签名技术。
The first generation of copyright protection is cryptography and digital signatures.
利用现代密码技术构造了两个数字版权保护方案。
Applying the modern cryptographical technology constructs two digital copyright protection schemes.
这类椭圆曲线可用于密码技术中各种合数阶群的情形。
This kind of elliptic curve can be used for various situations where composite order groups are needed.
密码技术是信息安全技术中的核心技术,只能自主开发。
The cryptology technology is the core of information security technology, which we can only empolder it by ourselves.
密码计算采用国家密码管理委员会办公室指定的密码技术。
The cryptographic computation adopts the cryptographic technique designated by the National Cipher Management Committee Office.
把近似熵用于密码技术中,设计一种实用的随机数检验方法。
Approximate entropy be applied to cryptographic technology, designing a testing method of a random sequence.
传统的版权保护和内容认证技术是密码技术和数字签名技术。
The traditional techniques of copyright protection and content authentication are cryptology technique and digital signature technique.
密码技术作为保密通信的关键技术已成为当代信息高科技的热点。
The cryptology becomes a hotspot of information high tech as the key technology of secure communication.
第三章研究课题是密码技术、数字签名、网络加密技术和安全API。
The third chapter studies cryptology data signature types of network cryptology and secure API.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
但同时也引发了一系列的安全问题,而密码技术是保证信息安全的关键。
However, they caused a series of security questions at the same time. The cryptography is the key technology of guaranteeing the information safety.
尽管安全技术涉及的范围十分广泛,但密码技术是各种安全技术的核心。
The information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.
文章把线性复杂度理论检用于密码技术中,设计一种实用的序列随机性检验方法。
Linear complexity theory be applied to cryptographic technology, designing a testing method of a random sequence.
他们能提供宽带技术传输信息,而且罗克韦尔的密码技术将保证网络信息传输的安全。
They would provide the broadband expertise to move that information and Rockwell's cryptographic solutions would ensure the information is secure as it moves across the network, Caslavka says.
由于密码技术的采用,电子选举协议在理论研究及实际应用方面都取得了一些成果;
Their purpose is to improve its safety and efficiency. Because of using cryptology, we have maken progress in theoretical research and application.
随着标准密码算法细节的公开,密码技术保护的信息系统的安全就取决于密钥的保护。
With the standard code computing methods being opened, the accounting system and the safety of code technology protection depend on the protection of secret key.
密码技术是信息安全领域的核心技术,在当今社会的许多领域都有着广泛的应用前景。
Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields.
数字版权保护问题越来越受到人们的重视,密码技术是解决这一问题的关键技术之一。
The problem of digital copyright protection is taken into account by more and more people. Cryptographical technology is one of the key solutions to this problem.
即使数据不是敏感数据或个人数据,在云中传输和操纵数据时也应该用密码技术加以保护。
Even if the data is not sensitive or personal, it should be secured with cryptography when transported to and from, and manipulated in, the cloud.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
密码技术的飞速发展,特别是公开密钥密码体制的提出,为信息安全提供了最强有力的保护。
The cryptology, especially the public - key cryptology can offer the highest level of information security.
在本文中,笔者着重研究如何利用现代密码技术来构造叛逆者追踪方案和数字版权保护方案。
In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.
序列密码作为主要密码技术之一,它的的安全强度完全决定于它所产生的伪随机序列的好坏。
The security of stream cipher, which is known as one of the main cipher techniques, dependents completely on the quality of generated pseudo-stochastic sequences.
针对密码技术在数据保护方面的不足,提出一种新的数字水印算法——基于分块统计的水印嵌入算法。
In order to use cryptographic techniques to avoid the lack of data protection, this paper proposes a new watermark algorithm based on block statistics.
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
该文试图通过对企业网络构成和安全需求的分析,提出基于自主密码技术的企业广域网系统安全方案。
This paper introduces the enterprise computer network organization and security requests in our country, and gives security scheme for enterprise network based on cryptography.
应用推荐