流密碼 的英文怎麼說

中文拼音 [liú]
流密碼 英文
stream cipher
  • : Ⅰ動1 (液體移動; 流動) flow 2 (移動不定) drift; move; wander 3 (流傳; 傳播) spread 4 (向壞...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. If the " harry potter " books stand as the essential popular read for young people, then " the da vinci code " has captured the crown for grown - ups

    如果說《哈里波特》系列從書代表了年輕人的主閱讀趣味,那麼《達芬奇》就贏得了成年人的青睞。
  2. At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used

    3 、對數據通信安全性起決定作用的加模塊所採用的加演算法進行了深入的分析,綜合加性能和實現的復雜度的考慮,採用了流密碼的加演算法。
  3. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保數據傳輸的安全性,運用流密碼對數據進行加傳輸,防止外來者的攻擊,未經授權進行非法數據讀寫操作。
  4. The stream cipher mode encodes data one bit at a time

    流密碼模式一次一位對數據進行編
  5. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、管理的應用需求等進行了詳細的分析和設計。
  6. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線體制的優點及研究現狀;其次研究了橢圓曲線體制的基本理論;第三,分析了橢圓曲線的安全性並介紹了鑰共享,加,數字簽名等橢圓曲線體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線體制時參考;第五,研究了目前行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線體制,包括ecdh , eces , ecdsa 。
  7. Fluid - inclusion is only mark of fossil ore - forming fluid and is the key that can understand the mechanism of ore - forming processes. by means of fluid - inclusions methods, we can acquire some important information of physics and chemistry in ore - forming processes, retrace the locus of ore - forming processes and clarify the mechanism of ore - forming processes

    體包裹體是成礦體留下的唯一痕跡和解開成礦體以及成礦作用機理的,通過體包裹體研究,可以獲得成礦作用過程中許多重要的物理化學參數,重塑成礦作用演化的軌跡,闡明成礦作用的機理。
  8. Block ciphers with long keys are stronger than stream ciphers

    使用長鑰的塊流密碼更強。
  9. A multidimensional chaotic stream cipher design based on parameters switching

    一種基於參數切換的高維混沌流密碼設計
  10. Chosen - ciphertext attack for chaotic self - synchronizing stream cryptosystem

    時空混沌自同步流密碼系統的選擇文攻擊
  11. However, block cipher algorithms tend to execute more slowly than stream ciphers

    但是,塊演算法執行起來通常比流密碼慢。
  12. Although it tends to execute more slowly than stream cipher, block cipher is more secure

    盡管塊的執行速度慢于流密碼,但塊更安全。
  13. Because each block is heavily processed, block ciphers provide a higher level of security than stream ciphers

    由於每塊都被嚴處理,因此塊流密碼提供更高的安全級別。
  14. The authors noted that stream ciphers like rc4 are vulnerable if two messages are encrypted with the same iv and secret key

    作者指出:如果用相同的iv和秘鑰加兩條消息,那麼流密碼(如rc4 )容易受到攻擊。
  15. A new non - linear stream cipher algorithm with ability of self synchronization is presented. this algorithm is also realized using verilog hdl and is simulated

    文章提出了一種帶有自同步功能的非線性流密碼演算法,並用verilog語言進行參數化的描述。
  16. Meanwhile, the implementation of such block cipher as rijndael with shifting registers is designed with performance as good as that of he method of table - lookup

    將移位寄存器實現高效流密碼的思想用於分組rijndael演算法的實現,獲得與查表法相當的效率。
  17. This dissertation mainly investigate important measure indexes ? inear complexity, k - error linear complexity and period, on the security of stream ciphers, design several fast algorithms for determining the linear complexity and k - error linear complexity of periodic sequences

    本文主要研究流密碼安全性重要的度量指標- -線性復雜度、 k -錯線性復雜度和周期等,設計出若干計算周期序列的線性復雜度和k -錯線性復雜度的快速演算法,得到如下主要結果: 1
  18. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組,還包括流密碼、 hash函數、消息認證、數字簽名和公鑰加等在內的強安全性的標準。
  19. Logical cipher contactless ic card chip is the most current in the entire world and our country, so this design direction is it, and the algorithm of cipher adopt stream cipher corresponding and compatible with philips mifare card

    非接觸ic卡中邏輯加型是目前世界和國內應用比較廣泛的,故本設計的方向選擇了非接觸邏輯加型ic卡,加演算法採用了和philips的mifare卡相兼容的流密碼演算法。
  20. A two - dimensional one - way coupled map lattice is proposed for cryptography of self - synchronizing stream cipher, which n ^ 2 space units produce chaotic stream outputs in parallel

    摘要提出了由單向二維耦合的映象格點組成新的時空混沌自同步流密碼系統,它能夠產生並輸出n ^ 2個平行混沌流密碼
分享友人