cryptosystem 中文意思是什麼

cryptosystem 解釋
密碼體系
  1. Some public key cryptosystem extended to abelian group

    一些公鑰密碼體制在阿貝爾群上的擴展
  2. Compared with classical cryptanalysis, power anlaysis attacks need less time and fewer money. it is widely used in cryptosystem

    能量攻擊一經提出,便受到人們的廣泛關注,在此方向的研究也層出不窮。
  3. A knap sack public - key cryptosystem based on factoring big integer problem

    一種基於大數難解問題的背包公鑰密碼體制
  4. Untraceable blind signature scheme based on the rsa cryptosystem

    密碼體制的盲簽名方案
  5. As regards cryptographic algorithm, according to database encryption requirement for cryptosystem, we adopt block cipher, which is high intensity and fast, based on analysing and comparing several popular cryptographic algorithm ; and resolve cipher message expansion problem through making improvement of block cipher with " cipher message whmovement "

    在數據的加密演算法上,本文在分析比較目前常用的加密演算法的基礎上,依據數據庫加密對密碼系統的要求,採用了保密強度大且速度快的分組密碼;並用「密文挪用法」對分組密碼進行改進,解決了加密后數據擴張的問題。
  6. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。
  7. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  8. The security of any cryptosystem depends on the security of the cryptographic keys used in the system

    任何密碼系統的安全都以密鑰的安全性為根本前提。
  9. In proceedings of the workshop on selected areas of cryptography, kingston, on, may 1994, pp. 120 - 128. 11 naccache d, stern j. a new public - key cryptosystem based on higher residues. in proc

    在求解點圓包含判定問題時, li的方法中計算雙方均能得到距離的具體值,從而能夠推斷出對方點的大致位置信息對方點所在的一個圓弧。
  10. Threshold signature scheme based on rabin cryptosystem

    密碼體制的門限簽名方案
  11. Chosen - ciphertext attack for chaotic self - synchronizing stream cryptosystem

    時空混沌自同步流密碼系統的選擇密文攻擊
  12. The analysis results show that the cryptosystem can resist brute attack and differential attack, and it is also of high security and strong practicability

    分析結果表明該演算法可以抵抗蠻力攻擊和差分分析攻擊,具有較高的安全性和很強的實用性。
  13. Design a user identity authentication scheme based on the elliptic curve cryptosystem

    設計了一種基於該橢圓曲線密碼體制的用戶身份認證方案。
  14. We present an image - hiding cryptosystem based on vector quantization and wavelet transform. the key information of secret image is encrypted and then hidden into another image, which can be publicly accessed. in the paper, we compress the key image information using vector quantization, and apply wavelet transform method in compressing and noise - removing to improve the image quality

    論文中,使用矢量量化的方法大大壓縮了保密信息的數據量,並將圖像的小波變換應用在圖像的前期壓縮和後期去噪聲的過程中,提高了壓縮比,增強了明圖的偽裝性,減少了運算時間,優化了解密圖像的效果。
  15. Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated

    對適于建立密碼體制的有限域f2m上的一類橢圓曲線進行了研究,分析了橢圓曲線密碼體制的安全性和常見的攻擊方法,因為橢圓曲線密碼體制的安全性只與橢圓曲線本身有關,所以選擇合適的橢圓曲線非常重要,指出橢圓曲線的計算是復雜的,分析研究了利用有限域f2m上的橢圓曲線建立密碼體制的相關問題,利用經過仿射代換后的橢圓曲線可以建立公鑰密碼體制,將其上的運算進行映射變換后易於設計演算法和便於實現。
  16. Shared verification signature scheme based on hyper - elliptic curves cryptosystem

    基於超橢圓曲線密碼的共享驗證簽名方案
  17. A software registration scheme and its implement based on elliptic curve cryptosystem

    基於橢圓曲線密碼體制的一種軟體注冊方案及實現
  18. In the dissertation, a " fast shamir algorithm represented by five - element joint sparse form " is presented. and it is demonstrated that comparing with other similar algorithms, the total numbers of the computation of our algorithm can be saved about 10 %, in the case of 192bit key. ( 5 ) in the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base - point choice algorithm of elliptic curve finite group

    已經證明,用本文提出的「五元聯合稀疏形式表示的shamir演算法」計算標量乘法對,在192bit的密碼體制中,其計算量比同類演算法平均減少了10兒( 5 )實現橢圓曲線密碼體制還有一個關鍵的步驟,就是橢圓曲線有限群基點選取演算法的設計與實現。
  19. A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers

    閾下通道是指在基於公鑰密碼技術的數字簽名、認證等應用密碼體制的輸出密碼數據中建立起來的一種隱蔽通道,除指定的接收者外,任何其他人均不知道密碼數據中是否有閾下消息存在。
  20. A general model of subliminal channels and some necessary conditions that the carrier cryptosystem must holds are given. a secret channel and an attack channel are first defined and some basic conclusions of the security are given. two new parameters, the embedding rate and the channel - using rate, that have large effects on the capacity and the security of subliminal channels are first defined

    給出了閾下通道系統的一般模型和宿主密碼系統須滿足的必要條件,首次定義了閾下通道中的秘密通道與攻擊通道,並給出關于安全性的基本結論,首次定義了對容量和安全性有一定影響的嵌入成功率和通道使用率兩個新參數。
分享友人