密鑰生成 的英文怎麼說

中文拼音 [yàoshēngchéng]
密鑰生成 英文
generate key
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ動詞1 (生育; 生殖) give birth to; bear 2 (出生) be born 3 (生長) grow 4 (生存; 活) live;...
  • : Ⅰ動詞1 (完成; 成功) accomplish; succeed 2 (成為; 變為) become; turn into 3 (成全) help comp...
  • 生成 : create; generate; produce生成演算法 generating algorithm; 生成文法 generating grammar; 生成物 pro...
  1. The number of pseudo - random key bytes to generate

    的偽隨機位元組數。
  2. It randomizes a combination every 60 seconds

    每隔六十秒便隨機
  3. To generate a key file, type sn - k file

    若要文件,請在命令行上鍵入sn - k
  4. To simulate the preparation of the secret - key, a gaussian random number generator in fpga is designed, which based on the analysis of ziggurat algorithm

    為了模擬的制備,在分析ziggurat演算法的基礎上完了高斯隨機數發器的fpga實現。
  5. The platform puts emphasis on the implementation of m - gdh. 2 protocol, and realizes such functions as follows : peer to peer network connection, dynamically displaying network topology, key generation, secure communication, help - online and so on

    該平臺以m - gdh . 2協議為開發重點,實現了網路對等連接、動態顯示網路拓撲結構、密鑰生成、安全通信以及聯機幫助等功能。
  6. The study of key generation was outlined from keystroke, voice and handwritten signatures and so on, and the security of key generation systems was introduced

    從擊鍵特徵、聲音和手寫簽名等物行為特徵詳細概述了物特徵的框架,並介紹密鑰生成系統的安全性。
  7. The designed rsa key generator can generate a pare of 1024 bits rsa keys within 30 seconds ( average value )

    所設計的密鑰生成1024位的rsa對的平均時間小於30秒。
  8. Data security technologies used in smart card are researched, and a rsa key generator integrated in smart card is designed

    本文對智能卡的數據安全技術作了分析研究,並設計了一個集於智能卡內的rsa密鑰生成器。
  9. The rsa key generator is made up of two parts : random number generator ( rng ) and the implementation of rsa key generation algorithm

    Rsa密鑰生成器由兩大部分構:硬體隨機數發器和rsa密鑰生成演算法的軟體實現。
  10. In the rest of this article, we will walk through the xml digital signature specification and the usage of several different bouncy castle key generators, encoding engines, digital signature singers, and a digest engine

    在本文的其餘部分,我們將簡略地論述xml數字簽名規范以及幾個不同bouncy castle密鑰生成器、編碼引擎、數字簽名簽名引擎和摘要引擎的用法。
  11. Fairly good chaos map, which is of high performance and be implement easily is selected. with the introducing of appropriate perturbation aimed to change the initial conditions, we may enlarge the chaotic sequence period under finite precision in practical applications. mixed chaotic model is constructed by combining logistic sequences and m - sequences in form of exclusive - or. and we, by adding two mixed chaotic model, constructed double chaotic system to generate the key generator, which provides with excerllent cryptographic properties

    本文利用混沌技術,通過對混沌映射的選取,選取出了易於實現,且性能優良的混沌映射;通過初始參數的加擾,使有限精度下混沌的短周期行為得以改善;通過利用混沌序列與m序列異或構了混合混沌序列,在混合混沌序列的基礎上構造出了雙混沌系統,從而提高系統的抗破譯能力,設計出了混沌序列密鑰生成器。
  12. Cmckg - pp cryptographic module for csp key generation services - protection profile cmckg - pp

    Csp密鑰生成業務用碼模塊.防護輪廓
  13. The model of the network transmission is divided to unicast, broadcast and multicast. for the different model has different require, this issue is discuss about the authentication and key agreement from this respect

    網路傳輸分為單播、廣播和組播,鑒于不同的網路方式對的要求也有所不同,本文從網路傳輸方式的角度對身份認證,會話密鑰生成、更新技術進行討論。
  14. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該密鑰生成的混沌序列碼的碼學特性良好。同時,本文還努力的尋求一種在有限精度條件下混沌加的可實現方案,並利用混沌序列碼對跳頻系統進行加
  15. Long keys generally yield stronger encryption than short keys

    通常會比短密鑰生成更強的加
  16. Eessi conformity assessment guidance - cryptographic modules used by certification service providers for signing operations and key generation services

    Eessi合格評定指南.認證服務供應商用於簽名和密鑰生成設備的碼模塊
  17. In the implementation of tpm, two algorithms are improved. one is key generation. the other is multiplicative inverse of modulo

    其中,重點改進了可信平臺模塊所用的兩個演算法:密鑰生成演算法和求模擬元演算法。
  18. A new method of key generation based on chaotic sequence

    基於混沌序列的密鑰生成新方法
  19. Here are the criteria on which the key generation algorithms are based

    以下是密鑰生成演算法所依據的標準:
  20. Certificate and key generation

    證書和密鑰生成
分享友人