達文數密碼 的英文怎麼說

中文拼音 [wénshǔ]
達文數密碼 英文
math search
  • : Ⅰ動詞1 (暢通) extend 2 (達到) reach; attain; amount to 3 (通曉; 明白) understand thoroughly...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 達文 : dak ven
  1. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    對美國高級加標準rijndael演算法進行了比較深入的研究,內容包括:從布爾函、 walsh譜和代結構的角度對其s盒性質進行的研究,簡化演算法的攻擊方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函式的兩種新方法,具有簡潔、易於編程實現、準確而快速的特點,應用於des演算法獲得與公開獻相符的結果,應用於rijndael演算法首次求出其s盒布爾函式。
  2. This method obtains structure types and strokes of chinese characters through chinese characters mathematic expression, and then the whole document is divided into two blocks by utilizing structure types of chinese characters. in each block, the position selected to embed is chose by chinese character ’ s strokes and the watermarking bit. watermarking bits with a robust structure is generated by chaos encrypting and hamming checkout coding ; embedding is implemented through setting underline to font

    該方法通過漢字學表式,獲取漢字的結構類型和筆畫,利用漢字的結構類型將整個檔分成兩塊,在各塊中由漢字筆畫和水印比特位共同確定水印加載的位置,通過混沌加和海明校驗編將水印生成一種具有魯棒性的水印結構,然後通過設置字體下劃線將水印按對稱性的嵌入策略分別嵌入本的兩塊中。
  3. Comparing with the image watermarking, the audio watermarking have a few characteristics : 1. comparing with the visual media, audio frequency signal has less sampling points at every time interval. 2. owing to human audition systems, it is more sensitive than human vision systems, therefore, it is more trouble to realize the imperceptibility of audition compared to the vision systems. 3. to stick up to the cut attack, embedded watermark should keep synchronization. 4. because of the bigger memory payload of audio frequency signal, the initial audio frequency signal must be removed during the extract in order to protect the maneuverability of project

    字水印技術是近幾年來學術界興起的一個前沿研究領域,提高演算法的魯棒性、安全性、實用性是字水印的研究方向。本提出的基於可視術的小波域下量化系的魯棒性音頻字水印方案,其優點在於利用小波變換的多解析度特性在保證水印魯棒性的同時使水印對原始音頻信號的影響到最小,採用量化系的方法嵌入水印信息實現了盲水印,提高水印的工程應用價值。
  4. ( 3 ) this thesis applies the elliptic curve cryptography over finite fields to the status authentication systems in the electronic commerce and proposes a new status authentication mechanism based on the discrete logarithm problem in the points on elliptic curves over finite fields. this new status authentication mechanism can provide increased speed and decreased key size for a given level of security

    山東師范大學碩士學位論? ?電子商務系統中的安全機制研究( 3 )將有限域上的橢圓曲線演算法( ecc )應用於電子商務中的身份認證系統,提出基於有限域上橢圓曲線點群中離散對問題的身份認證機制,僅用短的鑰就可以到rsa dsa演算法很長鑰的安全強度(目前,大約224bits的ecc就可以到2048的rsa的強度) 。
  5. These information properties include a company s financial data, human resource data, customer information, product sales data etc. because the confidentiality of information properties is getting more and more valuable, software development companies could use the complex designs of software protection lock to enable encode and decode data files, therefore software protection locks have an additional function

    這些信息資產包括公司的財務據人事據客戶據銷售據等。信息資產的保性愈來愈受重視,而軟體開發公司可利用軟體保護鎖的復雜設計來到將件做編與譯的功能,所以軟體保護鎖便又多了一項可利用的價值。
分享友人