選擇密文攻擊 的英文怎麼說

中文拼音 [xuǎnzháiwéngōng]
選擇密文攻擊 英文
chosen cipher text
  • : Ⅰ動詞1. (挑選) select; choose; pick 2. (選舉) elect Ⅱ名詞(挑選出來編在一起的作品) selections; anthology
  • : 擇動詞(挑選) select; pick; choose
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 選擇 : select; choose; opt; election; choice; culling; alternative
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Under assumptions of kea3, a decision diffie - hellman and a variant of target collision resistance tcrv, the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack ind - cca2

    Rd提出的elgamal deg方案具有相同的效率和帶寬,而deg方案在2004年亞會上證明為選擇密文攻擊ind - cca1安全,而新的體制則是ind - cca2安全的。
  2. Public key algorithms can also be easily broken by chosen plaintext attacks when the domain of the encrypted data is relatively small

    如果被加的數據范圍相對比較小的話,公共鑰演算法也比較容易受到
  3. The corresponding results show that the improved chaotic image encryption algorithm overcomes the original disadvantages, and is resilient to one known / chosen plaintext attack because of the adoption of wavelet transformation

    給出的實驗結果表明,演算法克服了現有的一些混沌加演算法的缺陷,可以有效地抵禦一類已知/,增強了加圖像的安全性。
  4. Security analyses of a variant of a new block cipher system ( called cac ) based on cellular automata theory are given using two cryptanalytic approaches. the results show that this variant of cac is very insecure under chosen - plaintext attacks

    利用兩種方法對一個基於細胞自動機的分組碼系統cac的變形進行了分析,結果表明: cac的這種變形在下是極不安全的。
  5. Chosen - ciphertext attack for chaotic self - synchronizing stream cryptosystem

    時空混沌自同步流碼系統的選擇密文攻擊
  6. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )鑰隔離公鑰加的一般模型和安全性定義,提出基於cdh假設的強( t , n )鑰隔離公鑰加方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  7. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加等技術手段提高系統的網路安全性能。
  8. Hcbc is proven secure against chosen - plaintext attacks assuming that e is a prp secure against chosen - plaintext attacks, while hpcbc is proven secure against choen - ciphertext attacks assuming that e is a prp secure against chosen _ ciphertext attacks

    但是如果假設是一個抗選擇密文攻擊的安全偽隨機置換,則可以證明hpcbc對選擇密文攻擊是安全的。
  9. The algorithm has a large space of the key, which can be proven by detailed analysis of the performance index, and can withstand chosen - text / cipher attack

    中對演算法進行了詳細的性能指標分析,結果表明:該演算法鑰空間巨大,可以有力地抵抗
  10. Because there is lots of encrypt algorithm in the world, this paper elaborates the core idea, the theory of several algorithm that are more popular at present, and analyzes the resist - cipher - attacking ability of the main algorithm adopted in this applying system

    由於目前國際上的加解演算法多種多樣,而且比較復雜,因此,本對其中流行的幾種加演算法的核心思想、原理以及原則進行了對比,對本課題採用的主要加演算法的抗碼分析能力也進行了剖析。
分享友人