This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
WS-Security provides a comprehensive set of security features for web service applications, building on established industry standards for cryptography and for XML encryption and signing.
WS - Security构建于成熟的密码学以及xml加密及签名的行业标准基础上,为Web服务应用程序提供了一整套的安全特性。
Because the OpenBSD project is based in Canada, no United States export restrictions on cryptography apply, allowing the distribution to make full use of modern algorithms for encryption.
因为OpenBSD项目是在加拿大进行的,所以其中应用的加密技术不受美国的出口限制,这使得该分发版可以充分利用各种现代的加密算法。
In encryption and digital signatures, everything ultimately boils down to the cryptography algorithms used to generate keys. Here are the criteria on which the key generation algorithms are based.
在加密和数字签名中,所有的事情都最终归结为生成密钥的加密算法。
In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider.
在这个演示中,我使用了SunJCE密码术供应商的tripledes块加密算法。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
Cryptography is sent by the general approach to data encryption to protect digital content before, the key given only to those legitimate users.
密码学的一般方式是在发送受维护数字内容之前对数据加密,仅把密钥给予那些合法的用户。
Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.
密码学是安全技术的核心,其中的加密解密、数字签名、密钥交换等技术是起到保障作用的重要机制。
In this part, the scrambling methods based on cryptography and chaos sequences are presented, and the encryption methods used in the TV are applied to the digital image scrambling.
这部分中,本文提出了基于密码学算法的图象置乱方法和基于混沌序列的图象置乱方法,并把电视信号加密方法应用到数字图象置乱中去。
For this purpose, after deeply researched Encryption and comparison, we use combination Encryption technique to optimize cryptography.
为此,我们深入研究加密算法,对多种算法进行了优劣性比较,用组合密码技术来优化和强化加密算法。
The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.
密码法的原则现今应用于传真、电视与计算机网络通讯的加密。
It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的保密性。
A new approach to VLSI implementation of RSA key generation is proposed in the paper, in which logic units are added to the RSA cryptography coprocessor to realize RSA key generation and encryption.
文章给出了一种RSA密钥生成的VLSI实现方案,在RS A协处理器基础上增加若干运算单元,来完成RSA密钥生成和加解密操作。
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
椭圆曲线密码(ECC)是一个基于椭圆曲线理论的公钥加密技术,可以用来创造更快、更小、更高效的加密密钥。
Greatest Common Divisor is one of the basic subjects in computational number theory, it has a wide application in encryption and analysis of cryptography.
最大公因子计算是计算数论的基础课题之一,它在密码算法和密码分析中有着非常广泛的应用。
In some detail, the paper expounds the principle about simple power analysis (SPA) attacks against the general cryptography and a particular theory against data encryption standard (DES) algorithm.
详细地阐述了对通用密码系统实施简易功耗分析攻击(SPA)的理论基础和对DES算法攻击的特定理论,并提出了对SPA的改进算法。
The application of cryptography has infiltrated all the fields of social life, as in data encryption, web security, digital cash and so on.
密码学的应用已经渗透到了社会生活的各个领域,如数据加密、网络安全、电子现金等。
This paper introduce some methods of classic cryptography and modern cryptography, including the methods of encryption and decryption and illustrating to help comprehension.
本文介绍了公钥体制中得到广泛应用的两种加密和解密方法,并举出了实例以帮助理解。
In modern cryptography, it is believed that any algorithm of encryption and decryption in cryptographical systems can be open, their safety depends on key security.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的安全性。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Biometric Encryption combines biometric recognition with cryptography so that it can prevent leakage of the biometric template while protecting individual information.
生物特征加密将生物特征识别与密码学相结合,在避免生物特征模板泄漏的同时保护了生物体所属信息。
Based on the public key encryption, the elliptic curve cryptography (ECC) is the highest security encryption based on each bit and it is considered as the next multipurpose public cryptography.
基于公钥密码系统的椭圆曲线密码系统(ECC)是迄今为止每比特具有最高安全强度的密码系统,被认为是下一代通用的公钥密码系统。
Based on the public key encryption, the elliptic curve cryptography (ECC) is the highest security encryption based on each bit and it is considered as the next multipurpose public cryptography.
基于公钥密码系统的椭圆曲线密码系统(ECC)是迄今为止每比特具有最高安全强度的密码系统,被认为是下一代通用的公钥密码系统。
应用推荐