crypto 中文意思是什麼

crypto 解釋
n. 名詞 (政黨、社團等的)秘密成員,秘密支持者。

  1. Republic and autocracy, a genetic differentiating of the cultural crypto - genes between the ancient rome and china

    共和制與專制,羅馬與中國古代社會遺傳基因考異。
  2. All elements in the crypto settings schema

    加密設置架構中的所有元素。
  3. Java security, part 1 : crypto basics

    Java安全性,第一部分:密碼學基礎
  4. Specifies all elements that are in the crypto settings schema

    指定密碼設置架構中的所有元素。
  5. Part 1 : crypto basics

    Java安全性第一部分密碼學基礎
  6. Ecc : elliptic curve crypto

    橢圓曲線加密
  7. Ecc elliptic curve crypto

    橢圓曲線加密
  8. Nowadays, more and more ic cores based on all kinds of crypto algorithm appear

    目前,基於各種密碼演算法的集成電路晶元已經出現。
  9. Cp crypto period cp

    加擾周期
  10. Cp crypto period

    加擾周期
  11. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公鑰加密系統中的橢圓曲線加密理論,詳細闡述了有限域上橢圓曲線的結構及其基本運算; 3
  12. Then we show an algorithm design of the elliptic curve crypto based on galois field. as a main part, the design theory and concrete solution of it are presented step by step, ic chip design method for implementation of the algorithm is described in detail

    設計完成了一種基於有限域的橢圓曲線加密演算法,主要包括適合於168bit橢圓曲線加密的有限域乘法、加法、除法器的實現; 4
  13. This thesis is composed of following parts : the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and galois field theory related with elliptic curve crypto is discussed

    論文的主要內容為: 1研究了現代密碼學相關的基本理論,介紹了密碼系統的數學模型、數據加密原理和與橢圓曲線加密密切相關的有限域理論; 2
  14. Assuming the operating system can be trusted which is a laughably big assumption, we can assume our database of crypto hashed passphrases is correct

    假設作業系統是可信的(這是個可笑的大前提) ,我們可以假設我們的加密雜湊密碼的資料庫是正確的。
  15. In addition, applications of secret sharing in signature and multi - party decryption are studied, and secure and efficient crypto - algorithms are proposed

    另外,研究安全秘密共享體制在數字簽名、多方解密中的應用,設計構造了安全有效的密碼演算法。
  16. T. r. n. rao and chung - huang yang, " aryabhata remainder theorem : relevance to public - key crypto - algorithms, " proc. 2005 symposium on cryptography and information security, kobe, japan, january 2005, pp. 1111 - 1116

    楊中皇,橢圓曲線密碼系統軟體實現技術之探討,資訊安全通訊,第十一卷第一期,頁15 ~ 25 , 2005年1月。
  17. In advances in cryptology - crypto 91, lncs 547, springer - verlag, brighton, uk, april 1991, pp. 72 - 77. 8 sadeghiyan b, pieprzyk j. on the necessary and sufficient conditions for the construction of super pseudorandom permutations

    Camellia是歐洲密碼大計劃nessie的最終獲勝者,並且是日本政府選定的用於電子政務的密碼演算法,它採用的整體結構是feistel結構。
  18. He teases out subtle linkages between the two of them, tiny “ crypto - currents ”, as he calls them, which demonstrate the extent to which the writers were preoccupied by each other, even without being fully aware of it themselves

    他調侃兩人微妙的關系為微小的「暗涌」 ,這體現了兩名作家互相關注的程度,甚至他們自己都沒有完全意識到。
  19. In proc. crypto 01, california, usa, august 19 - 23, 2001, lncs 2139, pp. 19 - 40

    從安全性的角度考慮,接收方不能得到指標集i的補集所對應的明文。
  20. For example, digital signature, identity distinguish are both the new technology and application derived from the cryptography. ecc is the one of the known public crypto methods that provide the best strength - per - bit. with the deeper application of ic card in the field of finance and telecom, the ecc crypto system will not only upgrade the application level of ic card, but also open up more application fields

    橢圓曲線密碼體制( ellipticcurvecryptosystem ? ecc )是目前已知的所有公鑰密碼體制中能夠提供最高比特強度( strength - per - bit )的一種公鑰加密體制,而智能卡已廣泛用於金融、電信等領域,利用橢圓曲線密碼體制不僅將大大提高智能卡的應用水平而且還將大大拓寬智能卡的應用領域。
分享友人