密鑰交換演算法 的英文怎麼說

中文拼音 [yàojiāohuànyǎnsuàn]
密鑰交換演算法 英文
kea
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ動詞1 (把事物轉移給有關方面) hand over; give up; deliver 2 (到某一時辰或季節) reach (a cert...
  • : 動詞1. (給人東西同時從他那裡取得別的東西) exchange; barter; trade 2. (變換; 更換) change 3. (兌換) exchange; cash
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基,分別運用公開系統進行,使通話各方各自產生完全相同的主,巧妙地解決了分配和加同步的問題,並利用單向散列函數的性質,基於相同的產生用於加的一次一會話
  2. It includes functions of tonglink / q, using rc5 encryption algorithm, md5 message digesting algorithm, diffie - hellman key exchanging algorism to implement point - to - point security

    描述了通過md5消息摘要, rc5加, diffie - hellman密鑰交換演算法保存等方實現點-點加的過程。
  3. In this thesis, we deeply research on secure transmission technique in military information system and presented a multipurpose image watermarking algorithm together with a new authentication and key exchange protocol. they can be well used in the transmission platform

    本文深入研究了軍用信息系統安全傳輸技術,設計和實現了一個多功能數字圖像水印和一個認證和協議,並將其應用到傳輸平臺中。
  4. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和的安全性;利用openssl標準庫函數實現系統的數據加模塊,實現對稱加、非對稱加以及信息摘要的常用
  5. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和協議,並在傳輸平臺得到了很好的應用。
  6. Gets the name of the key exchange algorithm

    已重寫。獲取密鑰交換演算法的名稱。
  7. Property to return the name for the key exchange algorithm

    屬性以返回密鑰交換演算法的名稱。
  8. Gets the key exchange algorithm used by this

    使用的密鑰交換演算法
  9. The name of the key exchange algorithm

    密鑰交換演算法的名稱。
  10. Property contains the key exchange algorithm used by this connection

    屬性包含該連接使用的密鑰交換演算法
  11. Computes masks according to pkcs 1 for use by key exchange algorithms

    根據pkcs # 1計用於密鑰交換演算法的掩碼。
  12. The key exchange algorithm protects information used to generate shared keys

    密鑰交換演算法保護用於生成共享的信息。
  13. Gets the name of the key exchange algorithm available with this implementation of

    的這一實現中可用的密鑰交換演算法的名稱。
  14. When overridden in a derived class, gets the name of the key exchange algorithm

    當在派生類中重寫時,獲取密鑰交換演算法的名稱。
  15. This class is only used by implementations of key exchange algorithms for mask generation

    此類僅由密鑰交換演算法的實現用於掩碼生成。
  16. In this theme, combined public key system composed by ecdh key exchanging algorithm and block crypt system is introduced

    在本課題中引入了由ecdh密鑰交換演算法和分組碼構成的混合公體制。
  17. Then we do some research about the basic protocols, the elliptic curve diffie - hellman protocol is improved as it can ’ t make identity authentity and can ’ t resist third party ’ s attacks ; at the same time, the signature equation of elliptic curve digital signature algorithm is reconstructed, and the improved kp + lqalgorithm is applied into verification stage, the whole speech of the protocol is improved greatly

    接著,研究和分析了基於ecc的各類碼協議。針對協議不能進行身份鑒別以及存在第三方攻擊的問題,對其加以改進;同時,對數字簽名協議中的簽名方程重新構造,並將優化的kp + lq用於驗證過程,提高了協議的執行效率。
分享友人