encryption scheme 中文意思是什麼

encryption scheme 解釋
加密方法
  • encryption : 編成密碼
  • scheme : n 1 計劃;方案;路線;設計。2 系統;配合;組織。3 綱目;表;清單;分類表;大綱。4 謀劃,策劃;詭...
  1. Data encryption scheme of network based on aes and rsa

    的網路數據加密方案
  2. Spatiotemporal chaos based digital image encryption scheme

    基於時空混沌序列的數字圖像加密方法
  3. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  4. Design of a complex encryption scheme based on rsa algorithm and hyperchaos

    演算法和超混沌的復合加密方案
  5. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加密系統主要包括以下模塊:本地密鑰管理模塊、密鑰服務器模塊、加密和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  6. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  7. This paper proposes a new public - key encryption scheme which removes one element from the public - key tuple of the original cramer - shoup scheme

    這里的標準模型指的是不利用隨機預言機這一工具來論證體制安全性的模型。
  8. Developers may want to include a computer security expert as part of the design team for implementing an enterprise encryption scheme

    開發人員在實現企業加密計劃時,設計小組中需要包括計算機安全專家。
  9. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )密鑰隔離公鑰加密的一般模型和安全性定義,提出基於cdh假設的強( t , n )密鑰隔離公鑰加密方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  10. In cryptology technology, which can be used to create digital evidence, we addressed three problems : a encryption scheme integrated fault tolerance and digital signature, a identification protocol based on zero - knowledge interactive proof, digital signature included single digital signature, multiple digital signature and ( n, t ) threshold digital signature. 5. the sk protocol was improved and s

    4 .在適合生成數字證據的密碼學技術研究中提出了:一個集成數據簽名和容錯技術並能在加密、傳送、解密和認證三個過程中實現容錯的rsa加密方案;一個基於零知識證明的身份認證協議;基於零知識證明的數字簽名方案。
  11. A new public - key encryption scheme

    一種新的公鑰加密方案
  12. Secondly, this paper put forward an encryption scheme which combining the strongpoint of two algorithms

    然後,本文提出了一種綜合idea和rsa的優點,同時又避免了它們各自不足的加密方案。
  13. A broadcast encryption scheme using hierarchical identity - based encryption

    一種基於身份分層結構加密演算法的廣播加密方案
  14. Based on learning the existing security schemes, an encryption scheme supporting secure in - network processing for wireless sensor networks was introduced

    在研究現有的安全方案的基礎上,提出了一種支持安全網內處理的無線傳感器網路加密方案。
  15. Digital encryption scheme based on des and rsa

    演算法的數據加密方案
  16. Convertible authenticated encryption scheme with message linkages

    具有消息鏈接的可轉換的認證加密方案
  17. Digital encryption scheme for military uhf mobile communication systems

    軍用uhf移動通信系統.數字加密體制
  18. Proving the security of an encryption scheme under the chosen ciphertext attacks

    一個加密方案的選擇密文安全性的證明
  19. Data encryption scheme of network based on rsa and advanced encryption standard

    和高級數據加密標準的網路數據加密方案
  20. The scheme is more efficient than the basic cramer - shoup ' s encryption scheme while its security against adaptive chosen cipher - text attack can be proved under the hardness assumption of decisional difhe - hellman problem. 2. study existing digital signature and develop an efficient digital signature based on certificate data

    在分析基本數字簽名方法的基礎上,設計並實現了基於離散對數困難問題( dlp ) ,輔以hash函數和公鑰證書進行簽名和驗證簽名的數字簽名方法。
分享友人