特別密碼 的英文怎麼說

中文拼音 [bié]
特別密碼 英文
special ciphers
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 特別 : 1 (與眾不同) special; unusual; particular; out of the ordinary 2 (格外) especially; particula...
  1. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由鑰控制」的變結構分組,該演算法區于其它大部分分組最大的點是它的s -盒不是固定不變的而是由鑰控制產生;第二種是基於smn ( d )陣列編的變結構分組,該演算法充分利用了smn ( d )陣列編具有距大的點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  2. Now it is used in cryptography and corrspording field, specially, men study wiretap channel of type ii with maintain secrecy corresponding

    它在學通信領域有著重要的應用,是在研究第二竊通道( wire - tapchanneloftype )時它與保通信有關。
  3. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋徵為代表的生物識技術與基於體制的身份認證協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  4. For the relocation of an expatriate staff in or out of hong kong upon assumption of a new post or termination of an existing post here, the payment by the employer is not made for holidays and will be out of the scope of the charge. registered users of teletax may lodge tax returns electronically by using a password

    為了方便市民登記成為電話稅務通用戶,使用通行以電子方式報稅,今年報稅表的首頁加印了納稅人的稅務編號。
  5. But they can be dangerous and sometimes attack people who venture too close, especially in fishing harbours where they come into close contact with fishermen offloading their catch. " it ' s a predator, it ' s got vicious teeth and if it bites you in the wrong place, it could kill you, " oosthuizen said

    但這些海豹同樣也有危險的一面,有時它們會向那些過于靠近自己的人發起進攻,是在捕魚頭,海豹們通常會主動與那些正在往船下卸載「戰利品」的漁民來一番「親接觸」 。
  6. By theory and practice simulation, the several types of constant envelope modulation techniques are analyzed and compared, including theirs modulation principle, phase path, the modulated wave envelope, power spectrums, error bit rate and the influence of its power spectrums of the band - limited and non - linear, etc. especially we have researched the ijf - oqpsk modulation technique, and the performance of its inter - symbol interference and time jitter free, and its strongly resisting of spectral spreading

    結合理論和實驗模擬結果,分析討論了衛星通信中的各種恆包絡調制技術,對它們的調制原理,相位路徑,已調波包絡,功率譜度,誤性能,以及帶限非線性通道對其功率譜的影響等方面都作了研究和比較。研究了ijf ? oqpsk在消除間干擾和定時抖動方面的性能及其優良的旁瓣性和抑制頻譜擴展性。
  7. Epdm colored granule is not only used in the track and field racetrack, all kinds of court, universities, middle and primary schools, stadium, still used in the slipresistance passway around the swimming pool, gymnasium, overpass, underpass, protecting such numerous respects as the place, ward, activity of disabled person and training court, distribution room, computer room of the army, the bathroom, kindergarten, nursery bottom game, etc

    三元乙丙橡膠可用於製造耐熱輸送帶蒸汽膠管耐化學品腐蝕的封製品極適用於橋梁頭軌道枕墊等緩沖及減振材料各種防水材料各種膠板和護套等它又是電線電纜的良好絕緣材料,適用於高中壓電纜還可製造各種汽車配件。
  8. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其鑰的選用和管理,介紹了端到端加;然後介紹了幾種常用的加演算法,通過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加演算法為基礎設計的流發生器( ksg )產生的序列進行加解運算,並且研究了此加過程的同步問題。
  9. ( 4 ) for the second hierarchy mentioned above, the key operation is the scalar multiplication, especially, the pairs of scalar multiplication used in certain practical elliptic curve cryptosystems

    ( 4 )對于第二層次的運算,關鍵是點元素的標量乘法運算,是在某些具體的橢圓曲線體制中需要直接計算標量乘法對。
  10. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    本文首先綜合運用概率論、代數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判條件;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的性質的研究轉化到對一類殊的矩陣的研究上;利用布爾函數的徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列、分組以及通信中的應用;給出了一類布爾函數walsh譜的分解式,並利用這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,殊情形下為k階擬bent函數;利用代數數論的知識考察了p值k階擬廣義bent函數的譜徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率徵等等。
  11. Quantum communication is a rising interdisciplinary field which combines classical communication and quantum mechanics. quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子術是經典通信和量子物理相結合的一門新興交叉科學。量子鑰分配( qkd )協議利用單光子固有的量子隨機性實現具有無條件安全性的鑰分配,是目前量子信息領域中具有現實意義的研究方向。
  12. This search is performed by going over a list of all the usernames that are allowed access to this particular site you are now in

    搜索是對一個允許進入這個區域的用戶名和的列表進行的。
  13. Ecc is considered to be an alternative to rsa. this article provides a brief description of rsa public key cryptography and the associated knowledge, in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3, in - depth studies present existed scalar multiplication, further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates, the improved algorithm compatible the advantage of the naf, has the least number of zero window and avoid a large number of inverse operation, successfully reduce scalar multiplication calculation

    本文闡述了橢圓曲線及其相關知識,說明了建立在有限域fp (其中p是大於3的素數)上的非奇異橢圓曲線e ,深入研究目前已有的各種標量乘法,由此提出了橢圓曲線演算法在混合坐標下改進的帶符號滑動窗口演算法,該演算法兼容了naf方法的優點,擁有最少數目的非零窗口數,又避免了域元素上的大量求逆運算,較成功地減少了標量乘法計算量。
  14. The newly established " li ka shing institute of health sciences " will devote its research effort mainly to areas related to the health of individuals, with particular emphasis on sickness prevention, clinical sciences, and regenerative medicine. research foci include early detection of severe diseases ( e. g

    中文大學稱新成立的李嘉誠健康科學研究所的科研焦點主要在預防醫學、臨床醫學和再生醫學;在危重疾病(如各類癌癥、基因遺傳疾病、常見都市病和傳染病)的領域內專注於三方面的突破:早期診斷、發展最新的治療方法和尋求破解患者的基因
  15. Later it came to include activities more precisely termed " web commerce " - - the purchase of goods and services over the world wide web via secure servers ( note https, a special server protocol which encrypts confidential ordering data for customer protection ) with e - shopping carts and with electronic pay services, like credit card payment authorizations

    后來電子商務包括的活動更加精確地被命名為"網商務" - -物品購買和服務在萬維網通過安全服務器(一個的協議, https ,為保護顧客而編成的機,它有著很機的數據)這個服務器還有電子購物手推車和電子支付的服務,就好像信用卡被授權支付一樣
  16. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux進行安全增強,設計一個新的安全操作系統,即slinux安全操作系統,其設計目標是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了標識與鑒機制, mac機制,最小權管理機制,可信通路機制,處理機制,客體重用機制以及隱通道分析機制,同時還進行了創新,引入了網路安全保護機制和審計機制。
  17. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和學;對相關數學理論進行了研究,是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取橢圓曲線上的隨機點的關鍵步驟,和ieeep1363的方法相比,它有易於軟體實現、效率高等優點,在國內外相關文獻上還未見到更好的求解方法;接著討論了橢圓曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取安全曲線及基點的步驟;文章還設計了橢圓曲線加系統的加解方案,討論了橢圓曲線系統的安全性問題。最後文章就koblitz曲線加系統進行了軟體實現。
  18. In recent years they have shifted the labour - intensive production processes to the mainland. the use of state - of - the - art equipment, especially those employing digital technology, has enabled the industry to raise quality and productivity to new levels

    本港印刷商繼續大量投資購置先進機器和設備,而近年更陸續把勞工集的生產工序遷往內地進行。印刷業採用最新設備,是一些採用數科技的型號,使印刷品在質素和產量方面均更勝從前。
  19. With the success of books such as " holy blood, holy grail, " " the templar revelation " and " the da vinci code, " all which carve out a special place for the feminine, and often the pistis sophia itself, it is clear that jung successfully predicted the return of the feminine

    隨著「聖血,聖杯」這樣的書的成功, 「聖堂武士的啟示」和「達芬奇的」 ,所有這些都為女性的位置開拓了的空間,通常是佩提絲索菲婭本身,容格很顯然已經成功地預見到女性的回歸。
  20. Elliptic curve cryptography ( ecc ) was proposed independently in 1985 by victor miller and neal koblitz. it is a cryptography with the highest security intensity of each bit up until now

    橢圓曲線體制( ecc )最早是在1985年分由v . s . miller和nealkoblitz獨立提出的,它是迄今為止每比具有最高安全強度的體制。
分享友人