• One-way trapdoor function has impotents applications in public cryptography.

    单向限门函数公钥密码学中有着重要的应用

    youdao

  • Based on the public key encryption, the elliptic curve cryptography (ECC) is the highest security encryption based on each bit and it is considered as the next multipurpose public cryptography.

    基于公钥密码系统椭圆曲线密码系统(ECC)迄今为止比特具有最高安全强度的密码系统,被认为下一代通用的公钥密码系统。

    youdao

  • Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.

    由于数字签名建立公用密钥密码术基础上的,因此计算个数字签名所花时间往往要比计算一个mac长得多。

    youdao

  • Digital signatures rely on public key cryptography.

    数字签名依赖公共密钥加密学

    youdao

  • Appendix 4: Public-key cryptography terminology.

    附录4公钥加密术语

    youdao

  • Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).

    不对称加密公钥加密(两个术语同义词)。

    youdao

  • Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).

    两个广泛使用公钥加密算法RSA(根据发明者RivestShamirAdleman 命名)和DSA数字签名算法)。

    youdao

  • While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.

    虽然起来不是什么了不起事,但分解找到一个离散对数困难形成大部分公用密钥密码学系统的基础如果不是全部的话。

    youdao

  • Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.

    数字签名用于验证消息是否真正发送发送;数字签名结合消息摘要公钥密码术使用

    youdao

  • The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.

    SSL协议基于公钥密码,加密密钥成对出现公钥密码中,它们是在数学上相关的,无法由个推知另一个。

    youdao

  • The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.

    传递数据使用公钥(非对称)加密算法加密所以只有对应持有者才能解密数据。

    youdao

  • RSA public-key cryptography is based on this property of factorization.

    RSA公钥密码系统就是基于这种因数分解特性

    youdao

  • I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.

    我们安全性加密技术,甚至公钥加密技术介绍了很多,目的是帮助成功开发一个PHP项目

    youdao

  • The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.

    很多应用程序平台都支持通过使用公钥加密相对容易地消息进行加密、发送解密

    youdao

  • However, public key Cryptography takes things a step further and introduces the idea of signed public keys.

    然而公钥密码术更进一步,它引入签名公钥概念

    youdao

  • A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).

    但是需要作出一些修改支持使用WS - Security公开密加密特性因此本文附带了一个单独代码(下载)。

    youdao

  • But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.

    但是我们首先扼要概述一下公开密加密原理WS - Security加密签名特性主要基础

    youdao

  • The scheme perfectly integrates digital signature scheme with public key cryptography system.

    方案数字签名公钥密码体制的有机集成。

    youdao

  • Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.

    椭圆曲线密码体制是目前公钥体制比特密钥安全强度最高的一种密码体制。

    youdao

  • In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.

    下列例子包括公钥加密轻松地校验身份。

    youdao

  • The cryptographic algorithm is public in modern cryptography.

    现代密码体制加密算法公开的。

    youdao

  • PKI ( Public Key Infrastructure), which is on the base of cryptography, resolved the issue of trust perfectly using public key certificate as a carrier.

    公钥基础设施)以密码学为理论基础公钥证书载体,较解决了网络中的信任问题

    youdao

  • Some applications try to combine public - and secret-key cryptography to achieve security and performance.

    有些应用试图秘钥密码术结合起来,获得安全性高性能

    youdao

  • Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.

    公钥密码技术结合传统对称密码技术信息摘要技术提供信息保密性完整性确认,是多种安全应用的基础。

    youdao

  • Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.

    公钥对称公钥密码学使用一对密钥,其中个定义加密存放另外一个称为公钥,通常无须加密。

    youdao

  • Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.

    组合公钥技术门限密码理论结合应用于移动自组网的密钥管理方案中。

    youdao

  • The wide use of public key cryptography requires the ability to verify the authenticity of public keys.

    公钥密码学广泛应用使得公钥真实性验证性成为必要条件。

    youdao

  • The wide use of public key cryptography requires the ability to verify the authenticity of public keys.

    公钥密码学广泛应用使得公钥真实性验证性成为必要条件。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定