encryption algorithm 中文意思是什麼

encryption algorithm 解釋
編碼演算法
  1. According to the research, the major work done is as following : < 1 > analyzes the symmetric - key encryption algorithm des and dissymmetric - key encryption algorithm rsa, and makes them easy to realize in hardware. < 2 > according to the algorithms and the thought of reconfigurable computing, the dissertation accomplishes the design of 64 - bit des system architecture and the design of 256 - bit ~ 1024 - bit rsa system architecture. < 3 > using the top - down high level design methodology and the hdl language, accomplishes the description of the des / rsa designs, the simulation and the synthesis

    本論文主要的研究工作: < 1 >對現有的對稱加密演算法des演算法和非對稱加密演算法rsa演算法進行分析,使其易用硬體實現; < 2 >基於可重構思想和特點,完成64位des演算法和256位1024位模長rsa演算法的可重構硬體的設計; < 3 >採用自頂向下的設計方法,利用hdl語言對des / rsa設計進行功能描述,並完成軟體模擬,綜合和布線; < 4 >在可重構計算驗證平臺上進行演算法驗證,並對設計的可重構和設計的進一步優化進行討論。
  2. It includes functions of tonglink / q, using rc5 encryption algorithm, md5 message digesting algorithm, diffie - hellman key exchanging algorism to implement point - to - point security

    描述了通過md5消息摘要演算法, rc5加密演算法, diffie - hellman密鑰交換演算法,密鑰保存等方法實現點-點加密的過程。
  3. In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm

    本文介紹了數據傳輸中公開密鑰演算法中的兩種- rsa加密演算法和diffie - hellman加密演算法
  4. Although ws - i is still working on finalizing the basic security profile, there is one aspect of the bsp that we felt needed to be further constrained - the choice of encryption algorithm

    盡管ws - i仍在進行basic security profile的收尾工作,但我們認為需要對bsp的一個方面進行進一步的約束:即加密演算法的選擇。
  5. Using the high sensitivity to the initial value of the chaos system, an assistant key is imported based on conventional chaotic encryption algorithm

    這種方法基於傳統混沌加密演算法,利用混沌系統對初始條件的敏感依賴性,在圖像加密過程中引入一個輔助密鑰,可有效抵抗已知明文攻擊。
  6. The corresponding results show that the improved chaotic image encryption algorithm overcomes the original disadvantages, and is resilient to one known / chosen plaintext attack because of the adoption of wavelet transformation

    給出的實驗結果表明,演算法克服了現有的一些混沌加密演算法的缺陷,可以有效地抵禦一類已知/選擇明文攻擊,增強了加密圖像的安全性。
  7. To protect the multimedia data, a mixed encryption algorithm together with two advanced cryptography - des ( data encryption standard ) and blowfish based on fingerprint watermark is studied. in this algorithm, the fingerprint data of people is embedded into the encrypted data

    為了對多媒體數據進行保護,研究了一種基於指紋水印數據的混合加密方案。該加密方案中混合了流行的保密性較高的des ( dataencryptionstandard )演算法和blowfish演算法。
  8. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms用戶權限的加密演算法,該演算法具有公匙和私匙兩個加密參數,通過異或等邏輯運算將用戶口令加密成偽碼再進行存儲。
  9. Universal key management system realizes its function through software encryption algorithm and key - memory issuing functions itself through master - card. sjy49 uses key management platform by hardwares. the algorithm used in the generation, diffusion, eduction and transfer of the key is approved by the state competent department. the implementation of algorithm is functioned by the encryption equipment recognized by the state competent department

    通用密鑰管理系統採用軟體密碼演算法,密鑰存儲分發等採用母卡方式實現; sjy49銀行ic卡密鑰管理系統採用硬體化的密鑰管理平臺,密鑰的生成、分散、導出、傳輸等密鑰管理功能使用的演算法是經國家主管部門審定通過的演算法,演算法的實現使用經國家主管部門審定通過的硬體加密設備。
  10. The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail. this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm

    文章最後分析了該密碼系統的安全性,對橢圓曲線離散對數問題的難解性以及三重des加密演算法的安全性作了較詳細的分析。
  11. It discusses about the safe serial communication about long nc programs between the embedded terminal and the cnc machine tool, which is realized by adopting the way of dnc communication. after analyzing characteristics about some kinds of data encryption algorithm, the rijndael encryption is selected to realize cooperative product data ’ s storage in the server and transmission in internet on encryption manner

    在分析各種數據加密演算法的特點后,選用了rijndael加密演算法,實現了外協產品數據在服務器上加密存儲、在網路上加密傳輸和在終端上被解密,並在終端與數控機床之間以dnc通訊方式實現長nc程序安全傳輸。
  12. Then based on it an audio encryption algorithm is proposed by adopting module operation, which has nice encryption characters in the simulation. another audio encryption algorithm based on zero dynamical nonlinear invertible system is studied and improved. in order to compare the encrypiton characters between the improved and the original algorithm, their applications to audio encryption are simulated, and the corresponding results are shown in chapter 3

    本文的主要成果有:提出了一種混沌實值序列的生成方法,並在此基礎上引入模變換對語音信號進行加密,經實驗模擬可以得到良好的加密效果;對零動態可逆混沌語音加密通用模型的一個具體加密演算法進行了改進,並通過模擬實驗比較了改進前後演算法的加密性能。
  13. We can take dsp to realize fast encryption algorithm because of its highly parallelism, application - specific hardware logic, and application - specific instructions. pci transaction and dsp processing of data can take place simultaneously for its dual - access ram ( daram ) and host port interface ( hpi ). and, the time taken for interruption almost can be ignored because of deep buffer technology

    Dsp具有高度的并行結構、專用硬體邏輯以及許多專用指令,可以實現快速加密演算法, dsp的雙訪問ram ( daram )和主機并行介面( hpi )可以實現數據pci傳送和dsp處理同時進行,另外採用了深度緩沖技術,使花在主機中斷上的時間幾乎可以忽略不計,所以基於dsp的計算機數據加密卡pcijmc2000獲得了較高的處理速度。
  14. Abstract aiming at the defects of diffusion function with lower diffusing speed and needing multiple round iteration to resist differential attack in the image encryption algorithm based on chaotic block cipher, a new chaotic image encryption algorithm based on output ? cryptograph mixed feedback was proposed

    摘要針對現有基於混沌分組密碼的圖像加密演算法中,擴散函數擴散速度慢、需要多輪迭代才能抵抗差分攻擊的缺點,提出了一種新的基於密文和輸出混合反饋的混沌圖像加密演算法。
  15. Pcijmc2000 can process data at a speed of 10 ~ 20mbit / s. it provides a convenient way for us to update encryption algorithm by applying hardware and software technology. and, it makes the encryption code more safely

    Pcijmc2000能提供達10 20mbit s的數據處理速度,採用硬體和軟體相結合的加密方法,可方便實現加密演算法升級,並使加密程序代碼更加安全可靠。
  16. Used a modified version of d. o. d. ' s encryption algorithm

    使用了國防部的加密運演算法
  17. If you re using rijndael as an encryption algorithm, it can t hurt to claim you re actually using twofish

    如果您正在使用rijndael作為加密演算法,則可以毫不費力地聲明您實際上在使用twofish 。
  18. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  19. Block ciphers use the same encryption algorithm for each block

    塊密碼對每個塊使用相同的加密演算法。
  20. In this demonstration, i use the tripledes block encryption algorithm of the sunjce cryptography provider

    在這個演示中,我使用了sunjce密碼術供應商的tripledes塊加密演算法。
分享友人