cryptograph 中文意思是什麼

cryptograph 解釋
n. 名詞 密碼;密碼打字機;暗碼記錄法。
vt. 及物動詞 譯成密碼。

  1. Archaeological studies of chinese music and military cryptograph

    中國樂曲考古學與軍事密碼學的比較
  2. Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph

    針對這些存在的問題,筆者提出了一種改進方案? ? bb84 +量子密鑰分配方案。
  3. The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers

    從一個公開密鑰和密文中恢復出明文的難度等價于分解兩個大素數之積。
  4. Cryptology is the core of the information security. modern cryptograph divides into the public key system and the private key system

    密碼學是信息安全技術的核心,現代密碼體制分為公鑰體制和私鑰體制兩大類。
  5. Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph

    入侵檢測是一種主動防禦技術,它彌補了防火墻、信息加密等傳統安全技術的不足。
  6. In this paper, the security of the wtls is analysed. now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack

    橢圓曲線法和ripemd ? 160是兩種目前較新的加密演算法,且不易被破解,本文初步分析和研究了這兩種方法。
  7. Last we describe the functions of the system in brief in the sixth chapter, we introduce the cryptograph protocol and the sollltion of some typical cryptosystems

    第六章介紹了密碼協議與典型密碼系統的實現方案。說明了密碼協議及其在安全系統中的應用,並分析了目前廣泛應用的典型密碼系統實現方案。
  8. This thesis mainly analyses security in the wtls and reasons for defects, study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm

    本文主要分析了wtls的安全漏洞及其存在的原因,並在此基礎上研究了兩種解決wtls安全問題的方法? ?橢圓曲線和ripemd ? 160演算法。
  9. The paper introduces a sort of encrypted algorithm which comparied with the original length of cryptograph, the length of encrypted cryptograph will base on the difference of the encrypted information piece length to minish

    本文介紹了一種加密后的密文長度與原明文長度文相比,依據所選加密信息塊長度的不同而做相應減小的加密演算法。
  10. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications

    公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。
  11. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。
  12. In this paper we study the security mechanism based on ip, because ipsec protocol is a security mechanism based on cryptograph, we discussed cyptograhical algorithm firstly, then we analyze the cryptographical modes in the enviroment of ip communications

    本文對基於ip的安全機制? ? ipsec協議進行了研究, ipsec協議是基於加密機術的安全機制。本文首先研究了加密演算法,重點研究了高級加密標準( aes )演算法及其在ipsec協議中的應用,並對ip環境下的加密模式做了一定的分析。
  13. In addition, the existence of quantum non - cloning theorem leads to the birth of quantum cryptograph. in principal, quantum cryptograph can provide perfect secure and unattacked secret communication system, which is guaranteed by the law of quantum mechanics

    又如,在量子信息學中因為存在量子不可克隆定理,從而誕生了量子密碼學,它原則上能夠提供不可破譯、不可竊聽的保密通信體系,其安全性由量子力學基本原理所保證。
  14. Abstract aiming at the defects of diffusion function with lower diffusing speed and needing multiple round iteration to resist differential attack in the image encryption algorithm based on chaotic block cipher, a new chaotic image encryption algorithm based on output ? cryptograph mixed feedback was proposed

    摘要針對現有基於混沌分組密碼的圖像加密演算法中,擴散函數擴散速度慢、需要多輪迭代才能抵抗差分攻擊的缺點,提出了一種新的基於密文和輸出混合反饋的混沌圖像加密演算法。
  15. The method of chaotic masking was also used to randomize the cryptograph. the computer experiments show that the chaotic encrypting system was fine in security and can resist the decipher analysis ; what ' s more, the system is easy to realize

    通過模擬分析各項性能(保密性能、對參數的靈敏度等) ,結果表明該系統具有較強的自同步能力和較高的保密性能,並且易於實現。
分享友人