攻擊曲線 的英文怎麼說

中文拼音 [gōngxiàn]
攻擊曲線 英文
attack curve
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 曲名詞1 (一種韻文形式) qu a type of verse for singing which emerged in the southern song and ji...
  • : 名詞1 (用絲、棉、金屬等製成的細長的東西) thread; string; wire 2 [數學] (一個點任意移動所構成的...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 曲線 : [數學] curve; bight; bought; profile; net曲線板 french curve; irregular curve; curve board; splin...
  1. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓演算法,使用sea演算法實現了安全橢圓的選取,實現了基於大素數域上的橢圓的elgamal加解密和數字簽名。 ( 3 )討論了橢圓在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  2. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals

    在結合橢圓密碼體制優點的基礎上,提出一種適于無通信網路中的相互認證和密鑰建立協議,不僅能有效防止上述,還適于在無終端設備上應用。
  3. Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated

    對適于建立密碼體制的有限域f2m上的一類橢圓進行了研究,分析了橢圓密碼體制的安全性和常見的方法,因為橢圓密碼體制的安全性只與橢圓本身有關,所以選擇合適的橢圓非常重要,指出橢圓的計算是復雜的,分析研究了利用有限域f2m上的橢圓建立密碼體制的相關問題,利用經過仿射代換后的橢圓可以建立公鑰密碼體制,將其上的運算進行映射變換后易於設計演算法和便於實現。
  4. The emulator can do simple power analysis attacks efficiently, but differential power analysis attacks still need to be improved

    模擬軟體可以有效地實施橢圓演算法的簡單能量分析,而差分能量分析還有待進一步改善。
  5. This is a contradiction to save a gradually longer key in a limit room. we proposed a solution to combine the elliptic curve cryptosystem and digital - image - hiding, the advantage of ecc ’ s shorter key at the same security level will solve the problem in some extent, at the same time make the transfer of document secure and also cryptic

    通過對現有商務文檔安全傳輸策略的研究和對比后,本文提出將橢圓密碼體制與圖像隱藏結合,利用ecc在相同安全強度下密鑰長度短的特點在一定程度上解決這一矛盾,同時達到安全性和隱蔽性的結合,能在一定程度上解決第三方的
  6. Third, two methods to generate the safe elliptic curve are introduced. the cm algorithm being ameliorated and algorithm to generate base point are presented by c + +. thus, elliptic curve generated by this algorithm can be safer

    第三,介紹了生成安全橢圓的兩種方法,並用c + +實現了cm演算法和基點的生成演算法,其中對經典的cm演算法進行了改進,使生成的橢圓安全性更高,能夠抵禦mov演算法的
  7. In this paper, we first introduces two fast elliptic scalar multiplications, signed odd - only comb method and width - w naf method. then, analyze their abilities to resist against power analysis. we also present improved scalar multiplication methods

    本文以兩種常見的橢圓快速演算法? ? signedodd - onlycomb演算法和width - wnaf演算法為基礎,對它們進行能量分析,分析它們的抗能量分析性能,並提出相應的改進演算法。
  8. Electromagnetic analysis ( ema ) attack is an effective means of attacking on elliptic curve cryptography ( ecc ) computations on mobile devices such as pda

    摘要電磁分析是對pda等移動終端設備的橢圓密碼系統進行的有效手段。
分享友人