Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
Appendix 4: Public-key cryptography terminology.
附录4:公钥加密术语。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。
This asymmetry is the property that makes public key cryptography so useful.
这个非对称的特性使得公钥加密很有用。 。
Secret key cryptography is one of the most important technologies in distributed systems security.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
The scheme perfectly integrates digital signature scheme with public key cryptography system.
该方案是数字签名与公钥密码体制的有机集成。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
The wide use of public key cryptography requires the ability to verify the authenticity of public keys.
公钥密码学的广泛应用使得公钥真实性的可验证性成为必要条件。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
Some applications try to combine public - and secret-key cryptography to achieve security and performance.
有些应用试图把明钥和秘钥密码术结合起来,以获得安全性和高性能。
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
It's sort of like those probabilistic tests used to produce large prime Numbers for public-key cryptography.
这类似于那些用来为公开密匙系统产生大质数的概率测试。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
The area and speed of cryptography coprocessor impede the application of public-key cryptography RSA for smart card.
密码协处理器的面积过大和速度较慢制约了公钥密码体制RSA在智能卡中的应用。
The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography.
而公钥密码算法正好可以解决这方面的问题,但在速度上远远不及对称密码算法。
Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.
以密码学中的公钥思想为基础,提出了一种基于原根的数字图像置乱技术。
This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.
该方案主要以目前比较成熟的公钥密钥学理论为基础,用到了RSA加解密、摘要、数字信封等算法。
Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.
椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography.
它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
应用推荐