asymmetric encryption 中文意思是什麼

asymmetric encryption 解釋
不對稱加密
  1. Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key

    此類非對稱轉換較比使用對稱密鑰進行加密和解密的方法,其開銷更大。
  2. Eds., spinger - verlag, 1998, pp. 26 - 45. 17 bellare m, rogaway p. optimal asymmetric encryption - how to encrypt with rsa

    無論解密者多少,該方案只需計算一次甚至零次配對,並且密文只有固定的3個群元素。
  3. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  4. Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family ( cff )

    我的翻譯是:基於多項式和「 cff 」的絕對安全的非對稱性加密方案。
  5. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  6. In addition, the grid application must handle both symmetric and asymmetric encryption schemes

    此外,網格應用程序必須處理對稱及非對稱的加密方案。
  7. Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption

    公鑰加密是使用一對非對稱的密鑰加密或解密的技術。
  8. In a real world scenario, alice and bob use public key asymmetric encryption to transfer a secret symmetric key and use secret key encryption for the remainder of their session

    在一個實際方案中,小紅和小明使用公鑰(不對稱)加密來傳輸私(對稱)鑰,而對他們的會話的其餘部分使用私鑰加密。
  9. Public - key encryption asymmetric cryptography

    公鑰加密(不對稱加密)
  10. Because of the properties of asymmetric key encryption technology, the recipient can then verify that the message was really from the sender by using the sender s public key because it is publicly available to verify the message digest for example,

    因為非對稱密鑰加密技術的特點,接收方可以使用發送方的公開密鑰(因為可以公開得到)驗證消息摘要(比如,
  11. In order to get high quality voice in spite of low - bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of voice activation and jitter compensation. on the other hand, we use some methods to make voice communication safe. the methods includes : filling traffic, encrypting voice datagram with conventional encryption algorithms ; encrypting session key with asymmetric encryption, multiple authentication

    為了保證通信鏈路不被分析,系統實現了一個通信量填充器;為了對傳輸中的語音數據包進行加密,系統提供了des 、 idea 、 blowfish和keyfile等各種常規加密方法;為了利用對稱加密的快速性和公開密鑰加密的方便性,系統只對會話密鑰進行公開密鑰加密。
  12. Asymmetric encryption and decryption

    非對稱加密和解密
  13. Performs asymmetric encryption and decryption using the implementation of the

    使用加密服務提供程序( csp )提供的
  14. To communicate a symmetric key and iv to a remote party, you would usually encrypt the symmetric key and iv using asymmetric encryption

    為了將對稱密鑰和iv傳送給遠程方,通常使用不對稱加密來加密對稱密鑰和iv 。
分享友人