cryptographic function 中文意思是什麼

cryptographic function 解釋
加密功能
  • cryptographic : 關于暗號的, 用密碼寫的
  • function : n 1 功能,官能,機能,作用。2 〈常 pl 〉職務,職責。3 慶祝儀式;(盛大的)集會,宴會。4 【數學】...
  1. Md5 message - digest algorithm 5 ; rfc 1321 is a widely used cryptographic hash function with a 128 - bit hash value

    Md5 (消息摘要演算法5 ; rfc 1321 )是一種廣泛應用的加密散列函數,使用了128位的散列值。
  2. The basic requirements for a cryptographic hash function are

    加密哈希函數的基本要求是:
  3. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加密標準rijndael演算法進行了比較深入的研究,內容包括:從布爾函數、 walsh譜和代數結構的角度對其s盒密碼性質進行的研究,簡化演算法的攻擊方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方法,具有簡潔、易於編程實現、準確而快速的特點,應用於des演算法獲得與公開文獻相符的結果,應用於rijndael演算法首次求出其s盒布爾函數表達式。
  4. The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field

    重新定義了有限域上邏輯函數的chrestenson線性譜,考察了新定義的chrestenson線性譜和原來的chrestenson循環譜的關系,並利用一組對偶基給出了有限域上邏輯函數的反演公式;給出了有限域上隨機變量聯合分佈的分解式,並利用隨機變量聯合分佈的分解式對有限域上邏輯函數的密碼性質進行了研究;給出了有限域上邏輯函數與相應素域上向量邏輯函數的關系,探討了它們之間密碼性質的聯系,如平衡性,相關免疫性,擴散性,線性結構以及非線性度等;討論了有限域上邏輯函數各類線性結構之間的關系,並給出了任意點都是線性結構的邏輯函數的全部構造,由此引出了有限域上的「泛仿射函數」的概念;考察了有限域上邏輯函數的退化性與線性結構的關系、退化性與chrestenson譜支集的關系;給出了有限域邏輯函數非線性度的定義,利用有限域上邏輯函數的非線性度與相應素域上向量邏輯函數非線性度的關系,考察了有限域上邏輯函數的非線性度與線性結構的關系;利用有限域上邏輯函數與相信息工程大學博士學位論文應素域上向量邏輯函數的關系,揭示了有限域上的廣義bent函數與相應素域上的廣義bent函數的關系,以及有限域上的完全非線性函數與相應素域上向量廣義bent函數之間的關系;給出了任意有限域上任意。
  5. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    本文首先綜合運用概率論、代數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判別條件;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的密碼性質的研究轉化到對一類特殊的矩陣的研究上;利用布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列密碼、分組密碼以及通信中的應用;給出了一類布爾函數walsh譜的分解式,並利用這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利用代數數論的知識考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率特徵等等。
  6. Information technology - security techniques - entity authentication mechanisms - mechanisms using a cryptographic check function

    信息技術.安全技術.實體鑒定機構.加密檢驗功能機構
  7. Data cryptographic techniques. data integrity mechanism using a cryptographic check function employing a block cipher algorithm

    數據密碼技術.採用字組數字演算法使用密碼檢查功能檢驗數據整體性機構
  8. Message text : a cryptographic function has failed

    消息正文: 「加密函數已失敗。 」
  9. Information technology - security techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm

    信息技術.保密技術.採用數據塊密碼運演算法的加密檢驗功能的數據集成機構
  10. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  11. Information technology - security techniques - entity authentication - part 4 : mechanisms using a cryptographic check function

    信息技術安全技術實體鑒別第4部分:採用密碼校驗函數的機制
  12. If the device only performs a simple cryptographic function, all of the objects must be managed by the software

    如果設備只執行簡單的密碼功能,則所有對象必須由軟體來管理。
  13. The reverse process of converting cipher text back into plain text is called decryption. a cryptographic algorithm frequently referred to as a cipher is a mathematical function to perform encryption, and vice versa, using keys

    加密技術范指透過特定程序演算法及密碼匙,將訊息從初始普通文本轉換為另一種不易理解的形式密碼文本。
分享友人