簽名演算法 的英文怎麼說

中文拼音 [qiānmíngyǎnsuàn]
簽名演算法 英文
signature algorithm
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 簽名 : sign one's name; autograph
  1. Also, with the fast method for computing the, trace of the elements in the finite field, two blind signature schemes based on extended xtr system are presented, the security is equivalent to solving discrete logarithm problem of extended xtr group while the datum is only as 1 / 3 as that of the previous schemes

    和別的方案相比,該方案在匿范圍選取上具有靈活性,在身份追蹤上具有限制性。 ( 4 )在xtr體制下,分別構造了一個環、盲和群盲簽名演算法
  2. Specifies the hash algorithm for the digital signature algorithm

    指定數字簽名演算法
  3. Research and implementation on algorithm of signature based on elliptic curve

    一種無求逆方案的橢圓曲線簽名演算法研究及其實現
  4. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密、 rsa非對稱加密、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  5. Research of ecc type digital multisignature schemes

    橢圓曲線型多重數字簽名演算法研究
  6. Specifies the key to be used for the digital signature algorithm

    指定用於數字簽名演算法
  7. Key the instance of digital signature algorithm

    包含密鑰的數字簽名演算法
  8. Creates the digital signature algorithm

    為指定的數據創建數字簽名演算法
  9. Verifies the digital signature algorithm

    在數據上驗證數字簽名演算法
  10. Gets the name of the signature algorithm

    獲取簽名演算法稱。
  11. Specifies the digital signature algorithm signature algorithm

    指定dsa (數字簽名演算法簽名演算法
  12. Study of ecc digital signature scheme

    的數字簽名演算法的研究
  13. Verifies a digital signature algorithm

    驗證數字簽名演算法
  14. At last, the implementation of a wlan authentication system based on the 802. 1x, in which eap - tls certification protocol and the ellipse key algorithm are used, is given. the authentication system includes applicant system in client, authentication system and servers using radius. in the implementation, the ecc signature algorithm is used to create certification, and the ecmqv is used in key negotiation stage

    最後文章結合eap - tls認證協議以及橢圓曲線密鑰實現了802 . 1x無線局域網認證系統,包括了客戶端申請者系統、認證者系統以及radius認證服務器系統,在實現過程中採用ecc簽名演算法來生成證書,密鑰協商階段採用ecmqv密鑰協商協議。
  15. Dsa public key cryptography using irreversible algorithms for the financial services industry - part 1 : the digital signature algorithm

    金融服務業用的使用不可逆的公用密鑰的密碼.第1部分:數字簽名演算法
  16. Creates a digital signature algorithm

    創建數字簽名演算法
  17. In this article, we study the implemetation of fpga for elliptic curve digital signature algorithm. based on number thesis 、 abstract algebra and complex thesis , integrated information theory 、 cryptography and some specific relevant algorithm , we ascertain the implementation of ecdsa for hardware project : according to the design idea of hiberarchy and modularization, we adopt very high speed ic hardware description language ( vhdl ) as design input and simulate the design in every level and every model for the correct of the fundamental design. after finish the top design, we perform the whole simulation. then , we carry out the timing simulation after the logic synthes and layout

    本文從實際應用出發,研究了橢圓曲線數字簽名演算法的fpga的實現:以基本的數論理論、抽象代數和復雜度理論為依據,結合信息論、密碼學的一些知識以及一些具體的相關,確定了ecdsa的硬體實現方案:按照層次化、模塊化的設計思想,採用硬體描述語言vhdl作為設計輸入進行ecdsa的硬體設計;在每個設計層次和每個模塊都進行了模擬驗證,得以保證底層設計的正確性。在確保每個模塊的設計正確后,完成對電路的頂層設計,進行總體的模擬。
  18. The algorithm for bridge certification authority certificates path verification based on transitive signature algorithm is proposed

    構造了基於傳遞簽名演算法的橋接ca證書路徑驗證方
  19. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字方案。
  20. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密散列數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排列碼加密解密的思想,實現了一種速度快、保密性強的數字方案。
分享友人