碼對稱 的英文怎麼說

中文拼音 [duìchèn]
碼對稱 英文
code symmetry
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : 稱動詞(適合; 相當) fit; match; suit
  1. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications

    公鑰密技術結合傳統的技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。
  2. A while ago, an ad hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least 90 bits for symmetric algorithms used in commercial security

    不久前,計算機科學家和密學家專門小組發表了一篇論文,建議用於商業安全的演算法至少要用90位的鑰匙。
  3. In advances in cryptology - eurocrypt 88, lncs 330, springer - verlag, davos, switzerland, may 1988, pp. 225 - 232

    如果分組密選擇明密文是安全的,則它是超偽隨機的。
  4. For symmetric cyphers, 128 bits is sufficient

    , 128位就足夠了。
  5. Public - private key combination is at the heart of public key infrastructure, and is based on asymmetric cypher

    公鑰-私鑰組合是公共密鑰基礎設施的核心,建立在非的基礎上。
  6. The most talked about algorithm in asymmetric cyphers is rsa, which uses 2048 - bit keys - equivalent to 128 - bit symmetric keys

    中最常說的rsa使用2048位密鑰,相當於128位的密鑰。
  7. The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques

    本文首先pki體系的底層技術進行深入研究,重點分析了非橢圓曲線密體制,並將它與其他密技術進行了比較。
  8. Represents the cipher mode used in the symmetric algorithm

    表示演算法中使用的密模式。
  9. A three - tier system is used in which encrypted tickets provided by a separate server called the kerberos key distribution center, or kdc for short are exchanged between the application server and client, rather than text userid and password pairs

    Kerberos使用一種三層系統,在這個三層系統中,應用服務器與客戶機之間交換加密的票據(單獨由一個名為kerberos密鑰分發中心,簡kdc的服務器提供) ,而不是交換文本形式的用戶id -密
  10. Comparing and analyzing the synchronous control strategy, which brings up the new method to control the double un - symmetry jars proceed synchronously with the combination of proportional valve and servo valve, which forms closed loop control ; basing on the above methods, models are made to get mathematics models of position control system and to analyze system model theoretically by using pid controller, we can realize regulating parameters, minimizing synchronous errors and enhancing the dynamic performances ; the simulink tool box in matlab software is used to imitate the system according to the model, which not only makes the result visual and easy to adjust the parameters in interactive way but also lets us understand the effects of different parameters and optimizes the dynamic properties. the theory of plc control in dshp is discussed after advanced understanding of the system movements. hardware design and general regulation are given on the base of siemens company products s7 - 200 plc

    本文根據大量的國內外文獻,研配液壓機的工作原理及設計結構進行了簡介;位置同步的控制方法進行了比較分析,提出比例閥和伺服閥復合控制的閉環結構來雙缸進行同步控制電液比例同步控制方案;在此基礎上著重比例閥控非缸建模,最後得到位置控制系統的總體數學模型,從理論上同步系統動態特性進行了分析,並用pid控制器進行參數整定,減小雙缸同步誤差、提高系統的動態響應性能;其中控制性能的分析藉助于matlab軟體中的simulink工具箱,由已建立的數學模型形成模擬模型,得到可視化的模擬結果,從而利於交互方式下調整參數,了解不同的參數系統的影響,優化同步系統的動態性能;在深入了解系統的動作特性后,plc控制研配液壓機的原理進行了探討,針siemens公司s7 ? 200型plc給出了硬體設計的總體規劃,編制出研配液壓機動作控製程序,在編程中著重研究位移傳感器與plc的通訊、雙缸同步運行的pid控制在plc上的實現及bcd撥盤輸入程序的植入問題。
  11. The pki environemt including development interface such as pem and der encoding and decoding, symmetry cryptography, rsa algrothm, random numeric generate, certificate request pkcs # 10 encoding and decoding, x. 509 certificate encoding and decoding, digital abstract, digital signature and verifying signature, digital envelope and advance services such as certificate authority and register authority

    為滿足設計需要的pki底層支持和上層服務平臺,本文設計和實現了pki環境,包括底層開發介面: pem與der編解加密、隨機數產生、 rsa演算法、證書請求pkcs # 10封裝與解、 x 509證書和黑名單編解、數字摘要、數字簽名與驗證、數字信封等和上層服務:認證中心和注冊中心。
  12. This method obtains structure types and strokes of chinese characters through chinese characters mathematic expression, and then the whole document is divided into two blocks by utilizing structure types of chinese characters. in each block, the position selected to embed is chose by chinese character ’ s strokes and the watermarking bit. watermarking bits with a robust structure is generated by chaos encrypting and hamming checkout coding ; embedding is implemented through setting underline to font

    該方法通過漢字數學表達式,獲取漢字的結構類型和筆畫數,利用漢字的結構類型將整個文檔分成兩塊,在各塊中由漢字筆畫數和水印比特位共同確定水印加載的位置,通過混沌加密和海明校驗編將水印生成一種具有魯棒性的水印結構,然後通過設置字體下劃線將水印按性的嵌入策略分別嵌入文本的兩塊中。
  13. In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key

    報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密匙」將資料作站站式加密。
  14. In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved

    系統會使用強化加密技術128 - bit secure socket layer ssl ,以「匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密匙」將資料作站站式加密,以達保密效果。
  15. We study and analyze the problems of wireless asymmetric network applications using the original tcp / ip as system transport layer protocols. it is the high error rate in wireless asymmetric link, high - latency, tcp / ip performance deteriorated because of the asymmetric data streams that depressed the efficiency of the utilization coefficient of the wireless link

    分析了基本tcp ip作為系統傳輸層協議用於無線非環境下存在的問題,主要是無線傳輸的高誤率、較大的延遲,及鏈路非性導致的tcp ip性能惡化,從而降低了無線鏈路的利用率。
  16. We study the theory of asymmetric digital subscriber loop ( adsl ), important in discrete multi - tone ( dmt ) modulation that is the usual international encoder in adsl

    本文系統研究了非數字用戶線的理論,重點研究了國際上其通用的編方式?離散多音調制( dmt )技術。
  17. Main contributions of this thesis are as follows : firstly, describe the theory of the hamilton array codes and its general construction. secondly, we construct and program the fast algorithm of hamilton array codes for high dimension and big hamming distance. thirdly, we discussion the design principle of the symmetry ciphers

    內容包括:首先論述了hamilton陣列編的理論和常規構造方法;然後,構造和實現了快速高維大距hamilton的陣列編構造演算法;接著,探討了(包括分組密和序列密)的設計原理,最後,結合lfsr和hamilton陣列產生通用密鑰編排演算法。
  18. ? we justify the applicability of antisymmetry biorthonormal wavelets ( asbw ) to image coding by a number of experiments, and found that the performance of some selected asbws is at least the same as the famous 9 _ 7 wavelet, which is a symmetry biorthonormal wavelet. however asbw has a potential advantage, namely extracting image edges from the coefficients decomposed by asbw, it may give a way to feature extraction from image compression data domain without completely image reconstruction

    它的性能和目前在壓縮編中常用的9 - 7雙正交小波可以比擬,但是由於反雙正交小波還有如下潛在優點,即從壓縮數據域中不經重構圖像即可提取圖像邊緣,故應雙正交小波在圖像編中的地位予以充分重視。
  19. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密學的基本概念、分類,密鑰密體制des與aes以及公開密鑰密體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  20. The research for key techniques of turbo codes is processed. it includes, ? the design of optimal component codes and the performance of asymmetric turbo codes are analyzed ; ? a search algorithm for short random interleaver based on the distance spectrum and ids criteria is carried out and simplified ; ? random puncturing method to improve the weight distribution of turbo codes with some special code rates is analyzed and simulated. ? the effect of different schemes of trellis termination to the performance of turbo codes is analyzed ; ? a new low complexity decoder structure is provided ; 5

    turbo的部分關鍵問題進行分析和改進,主要包括: ?分析了最優分量的設計和非turbo的性能; ?設計了基於距離譜和ids的短隨機交織器搜索演算法並進行了簡化; ?提出了採用隨機刪余方式改善特定高率turbo重量分佈特性的方法; ?分析了不同編器狀態歸零方案turbo性能的影響; ?提出了一種降低實現復雜性的turbo迭代譯器結構。
分享友人