秘密密鑰 的英文怎麼說

中文拼音 [yào]
秘密密鑰 英文
secret key
  • : 秘Ⅰ形容詞(秘密的) secret; mysterious Ⅱ動詞(保守秘密) keep sth secret; hold sth back Ⅲ名詞(使...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 秘密 : secret; clandestine; confidential
  1. Dr. aki ross voiced by actress ming - na has teamed up with captain gray edwards alec baldwin to search for the " eighth spirit, " a powerful entity dwelling in an unknown life form somewhere on the planet. it holds the key to perfecting a system of energy waves that will neutralize the phantoms

    然而異種勢力驚人,死神逼在眉睫,唯一能拯救人類的就只有亞紀結合智慧與美貌的科學家,她掌握殲滅異種的匙在地球上找尋八個「精神」 。
  2. ( 3 ) the embedded watermark can be extracted only by using a secret key

    ( 3 )採用以加強水印的性。
  3. Quantum key distribution and secret sharing via w states

    態的量子分配和共享
  4. Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too

    蠻力的碼術攻擊為了破解一個消息,需要按某種順序嘗試每一個可能的
  5. Quantum cryptology is a new method for secret communications. this new method utilizes the quantum nature of single photons. data can be transferred with a proven security via the protocols of quantum key distribution

    量子碼術是一種實現通信的新方法,它利用單光子的量子性質,藉助量子分配協議可實現數據傳輸的可證性安全。
  6. The critical operation in public - key encryption is verifying the identity of a message s recipient, so as to encrypt with the correct public key

    其中我們最喜歡的一個就是用於演算法的「百萬位」廣告。
  7. The private key is secret and must be protected with a password

    私人的,因此必須有碼保護。
  8. The set of participants to perform key agreement should satisfy threshold

    該方案使得參與者可以協商秘密密鑰,而不用基於離散對數假設。
  9. The public and private keys are based on a pair of very large prime numbers that are not known by anyone intercepting the message

    公開秘密密鑰是基於一對想截獲報文的人不知道的非常大的素數。
  10. Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it

    接收者利用發送者的公開和他們自己的秘密密鑰的結合,解開該報文的編碼,並解之。
  11. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加和解都使用相同的,因此這種演算法被稱作「對稱」 。對稱有時也被稱為秘密密鑰,因為文的安全取決於能否被保
  12. The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity

    秘密密鑰碼體制存在管理的問題,而公碼體制在有效解決管理問題的同時卻又帶來了公真實性的問題。
  13. The dynamic ( t, n ) threshold secret sharing scheme based on certificate uses the key in the participant ' s certificate as his share. this scheme can assure that any t participants can calculate the secret value, but no group of t - 1 participants can do so

    基於證書的動態( t , n )門限共享方案將每個參與者的證書公對應的秘密密鑰作為子,它能保證t個或t個以上的參與者聯合可重構共享,而少於t個參與者聯合不能得到共享的任何信息。
  14. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘密密鑰碼體制、公開碼體制、 hash函數以及基於x . 509的公證書等基礎碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  15. When there is not a trusted share distribution center, this dissertation gives a solution how the group signature is realized for vector space access structure, or constructs a vector space secret sharing - multisignature scheme without trusted share distribution center, and analyzes its security. the generalized - multisignature scheme is proposed based

    在該方案中,參與者共享rsa簽名方案的秘密密鑰,能保證矢量空間訪問結構中參與者的授權子集產生有效的rsa群簽名,而參與者的非授權子集不能產生有效的rsa群簽名。
  16. The sender of an internet communication can not necessarily be presumed to be who he says he is, nor can the sender always be sure of the recipient s true identity

    另一把叫「私人匙」 ( privatekey ) ,這把匙只能由其持有人知道,並且必須保持性。
  17. Then the strong - rooms underground, at tellson s, with such of their valuable stores and secrets as were known to the passenger and it was not a little that he knew about them, opened before him, and he went in among them with the great keys and the feebly - burning candle, and found them safe, and strong, and sound, and still, just as he had last seen them

    於是臺爾森銀行地下室里的保險庫在他眼前打開了,裏面是他所熟悉的寶貴的貯藏品和這類東西他知道得很不少。他手執巨大的匙串憑借著微弱的燭光在貯藏品之間穿行,發現那裡一切安全堅實穩定平靜,跟他上次見到時完全一樣。
  18. Both peer a and peer b can use a shared key to exchange a secret message, or peer a can use the private key that corresponds to a public key that peer b holds to perform the same operation

    如對等點a和對等點b都可以用一個共享交換的訊息,或對等點a可以使用對應于對等點b持有的公用匙的私用來完成同樣的操作。
  19. If you want to export the certificate sometime in the future, check on box mark the private key as exportable as well

    如您想在今後可以匯出此證書及配對碼匙,請同時選擇將標示為可匯出的。
  20. That kid yoo jin has the keys to that secret

    由珍那孩子掌握了這個
分享友人