認證碼 的英文怎麼說

中文拼音 [rènzhèng]
認證碼 英文
ac authentication code
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  1. Construction of cartesian authentication codes from unitary geometry

    認證碼的構造
  2. In the end, quick implementation of kasumi, f8 and f9 are simulated under the condition of windows 98 with celeron 633 and 128m memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1. 9mbit / s, while f9 algorithm only takes 20ms to compute the mac with the length of 5114 bits, both of which can reach the basica requirement of 3g

    在本文的最後我們對kasumi , f8演算法和f9演算法的快速實現進行了具體的模擬, f8演算法的具體實現是在windows98 ,賽揚633mhz和128m內存的環境下其加密速率可以達到1 . 9mbps ,而f9演算法在同樣的條件下計算5114比特的字元串的消息認證碼所需時間僅為20毫秒,這些速率基本上可以滿足3g中高速率傳輸的要求。
  3. We have the identification keys

    我們得到了認證碼
  4. Their size parameters, the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed ; chapter three use sympletic geometry to construct authentication codes with arbitration, some parameters and the largest probability of successful attack are also computed ; chapter four is about lattices generated by transitive sets of subalgebras under finite chevalley groups

    並計算了相關參數及成功偽造和成功替換的最大概率;第三章在辛幾何的基礎上構造了具有仲裁的認證碼,亦計算了相關參數及各種攻擊成功的最大概率;第四章討論了有限域上chevalley群作用下的子代數軌道生成的格。
  5. In this new protocol, the authentication code of the its initiator depend on the shared long term key, but the authentication code of the its responder relies on session key, and the session key is a hashed value of concatenation of the long - term shared key, the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol resists key - compromise impersonation

    在新協議中,協議起始方的認證碼依賴于長期共享密鑰,但協議的應答方的認證碼依賴于會話密鑰,且會話密鑰是由長期共享密鑰、長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積三部分串起來的哈希值,這就保它具有密鑰泄漏的安全性。
  6. In this paper, we describe a new construction of authentication codes with arbitration using unitary spaces, some parmeters and the probability of successful attack are computed

    本文給出一種由酉幾何構造具有仲裁的認證碼的方法,並計算了有關參數,分析了各種攻擊成功的概率。
  7. On improving multicast source authentication to achieve better security

    基於消息認證碼的組播源研究
  8. Sure, you don t have to encrypt the data - you can use a message authentication code - but most users are unlikely to anticipate this risk

    您確實不必加密數據您可以使用消息認證碼( mac )但大多數用戶未必預見到這一風險。
  9. If the information is digitally signed or a mac message authentication code is added to the information, both parties can be sure that the information wasn t modified, as well

    如果信息是被數字簽名過的或在其中加入了mac (消息認證碼) ,那麼雙方還能確定該信息沒有被修改過。
  10. It avoided the disadvantages of traditional cryptography by adopting only two cryptography components : visual cryptography and mac, and the safety has not been lowered down

    在方案中僅僅使用了視覺密和消息認證碼兩個密組件,在不降低安全性的前提下,有效地避開了傳統密的缺點。
  11. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密,還包括流密、 hash函數、消息認證碼、數字簽名和公鑰加密等在內的強安全性的密標準。
  12. Cryptography technology provides the basis for such a mechanism. symmetric cryptosystems can provide privacy service ; hash functions and message authentication codes can provide integrity service ; asymmetric cryptosystems ( public key cryptosystems ) can provide authentication service

    對稱密鑰密技術提供了機密性服務;雜湊函數和消息認證碼提供了完整性服務;非對稱密鑰密技術(公鑰密技術)提供了身份服務。
  13. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密技術、非對稱密技術、消息認證碼技術、公鑰書和公開密鑰基礎設施技術提供了保網路通信數據的機密性、完整性和對通信各方進行的機制。
  14. The code you submitted could not be authenticated

    不能鑒別你輸入的認證碼
  15. Access code 5j55j

    認證碼5j55j
  16. A construction of authentication code with arbitration from characteristic 2 pseudo - symplectic geometry

    利用特徵為2的偽辛幾何構作一類新的帶仲裁的認證碼
  17. Unconditionally secure authentication codes with arbitration protects against deceptions from the transmitter and from receives as well as those from the opponent

    摘要具有仲裁的認證碼既要防止敵手的欺騙,又要防止收方和發放的互相欺騙。
  18. Unconditionally secure authentication codes with arbitration protect against deception from the transmitter and from the receiver as well as that from the opponent

    摘要具有仲裁的認證碼即要防止敵手的欺騙,又要防正收方和發方的互相欺騙。
  19. A construction of authentication codes with arbitration from subspace of vector space over finite fields is presented, the parameters of the code are computed

    摘要利用有限域上向量空間的子空間構作了一個具有仲裁的認證碼,計算了這個的參數。
  20. List as follows : firstly, the saka protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long - term shared key, so it does not resist key - compromise impersonation

    具體工作如下:首先,分析了saka協議,由於協議參與者雙方的認證碼完全依賴于長期共享密鑰,因此它不具有密鑰泄漏的安全性。
分享友人