cryptogram
n. 密码
2025-09-06 21:46 浏览次数 9
n. 密码
threshold cryptogram门槛密码学
laser cryptogram激光密码
cryptogram lock密码锁
cryptogram theorem密码理论
data cryptogram数据加密
Application Cryptogram应用密文
secret code保密码,[通信] 密码
primary cryptogram密码
password密码;口令
cryptogram telephone话密机
the ecc and classical public key cryptogram system are compared.
比较了ecc与经典公钥密码体系间的优劣;
considering rsa is one of the most popular public key cryptogram algirithms, a new group signature scheme completely based on rsa is proposed.
考虑到rsa是应用最广泛的公钥密码体制之一,首次基于rsa设计出一种群签名方案。
in this paper, through analyzing the advantages and security of rsa encryption system and chaotic encrypt, a new grouping double-key cryptogram scheme is presented.
在分析了rsa公钥加密系统和混沌加密各自的优点及其存在的安全问题的基础上,提出了一种新的分组双密密钥密码方案。
strand space model is a new formal analysis tool to the analysis of cryptogram protocol.
串空间模型是一种新兴的密码协议形式化分析工具。
the information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.
尽管安全技术涉及的范围十分广泛,但密码技术是各种安全技术的核心。
cryptographic algorithm and key are the very important part of cryptogram technology.
密钥和密码算法的安全是密码卡的核心和关键。
rsa public cryptogram algorithm is based on theorem of euler, whose security depends on the difficulty about the factor decomposed of great number.
rsa公钥密码算法的基础是欧拉定理,它的安全性依赖于大素数因式分解的困难性。
because of the unsuitable of using only symmetry cryptogram or public key cryptogram, it could hardly fulfill the information security requirement.
由于单纯采用对称密码和公钥密码体制在信息安全方面有诸多不适之处,很难满足信息安全的要求。
software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.
软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。
this paper summarizes the development and applications of information security technologies, especially the cryptogram technology.
文章综述信息安全技术,特别是密码技术的发展与应用。
therefore, the key of the efficient executing elliptic curve cryptogram is the efficient computing of multiple point.
因此倍点运算的快速计算是椭圆曲线密码快速实现的关键。
in this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced.
本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。
cipher card is a hardware module based on bus interface of computer and offering cryptogram service function.
加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。
the digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。
secure electronic transaction protocol(set) has guaranteed security problem in the electronic payment process through formulating standard and using cryptogram technology.
安全电子交易协议set通过制定标準和采用各种密码技术手段,确保了电子支付过程中的安全问题。
high performance cryptogram server provides a safe, highly effective platform of cryptogram programming of information.
高性能密码服务器提供了一个安全、高效的信息密码化平台。
in terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.
根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。
vpn technology is a virtual private network technology which use the cryptogram knowledge in the establishment of open public networks.
vpn技术是利用有关密码学知识在开放的公共网络上建立虚拟专用网络的技术。
the data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.
在传输方面,采用已通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。
the technical of cryptogram which refer to this paper is discussed firstly. and the emphases of this discussion are about the elliptic curve cryptographic algorithms and authentication.
本文首先对论文中所涉及的密码技术作了介绍,重点讨论了椭圆曲线加密算法和几种常见的身份认证技术。
cipher card can offer cryptogram service to pc system and network security device to realize safe storage for files and secure communication for information on network.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
cryptogram programming of confidential information is an effective tool for ensuring information security.
机密信息的密码化是保证信息安全的一种有效手段。