key signature 中文意思是什麼

key signature 解釋
【音樂】調號。

  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • signature : n 1 簽名,署名,畫押,蓋章。2 【音樂】記號〈調號或拍子記號〉;【無線電】(廣播節目開始或完畢的)...
  1. Chameleon signature, chameleon hash, key - exposure

    因此,變色簽名又是不可偽造的
  2. The wave motion bears the key signature imparted by the nature and extent of the source.

    波動具有由震源的性質和范圍造成的主要特徵。
  3. Will remove the key signature block

    將會移除密鑰簽名塊。
  4. This last may also be in a key signature to show changes in key

    升降號也可畫在調號上以表示調的改變。
  5. This is because the key signature contains a hash of the file, and modifying the file renders the hash invalid

    這是因為,該密鑰簽名包含該文件的哈希,修改該文件會呈現無效的哈希。
  6. The third party uses the message, the key signature and the known public key to verify the source as trusted

    第三方再根據該訊息、金鑰簽章與已知的公開金鑰,認證該訊息具有可信賴的來源。
  7. A key signature is placed at the beginning of a piece of music or of a section to indicate the key of the piece or section

    調號位於一篇音樂作品或一章節的開始部分,來表示該作品或章節的調域。
  8. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  9. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  10. The thesis analysed the chief technique problems and designed the solution algorithms, proposed measures of the software fault tolerance techniques suitable for the hardware platform of the robotic system on the base of studying the two key techniques - eddi and cfcss. first, the thesis has done the analysis in theory for the chief technique problems including basic block partition, software signature instructions generation, shadow instructions generation and instructions scheduling, proposed the algorithms suitable for the target platform. then, the thesis introduces the design process of the software fault tolerance

    本文在研究了sihft的兩項關鍵技術?復制簽名檢錯技術和軟體簽名控制流檢錯技術的基礎上,針對小型智能飛行機器人系統的硬體平臺,對軟體檢錯技術的關鍵問題進行了分析並給出了解決問題的演算法,提出了適于小型智能飛行機器人硬體平臺的軟體檢錯技術方案。
  11. This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time

    本文在介紹密碼學知識的基礎上,剖析了x . 509證書的證書結構,詳盡闡述了pki的原理和各個組成部分的功能,並結合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、密鑰恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。
  12. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  13. In the common signature system, the signed document can be verified illimitably, anyone can verifies its validity with the group key. but in some special setting, large numbers of verifier are not appropriate, sometimes document can only be verified by some designated people. this paper proposes the designated - verifier group signature scheme with the udvs on acjt. at last this paper implements the multi - bank system with above schemes, remedies the limitation of forgoing schemes, and resolves the par value problem. the par value is designated by the bank, and it is binding with the signature, thus the problem of user cheating can be avoided

    在普通的簽名系統中,簽名文件是可以無限驗證的,即每個人都可以通過群公鑰來驗證其有效性,但在某些特殊領域,尤其是電子銀行業務中,這樣廣泛的驗證人群在某些情況下是不合適的,有時,某些特殊的簽名文件只能有某些指定的驗證者進行驗證,本文在acjt方案的基礎上,根據通用的指定驗證者的方案構造了指定驗證者的群簽名方案。
  14. In the rest of this article, we will walk through the xml digital signature specification and the usage of several different bouncy castle key generators, encoding engines, digital signature singers, and a digest engine

    在本文的其餘部分,我們將簡略地論述xml數字簽名規范以及幾個不同bouncy castle密鑰生成器、編碼引擎、數字簽名簽名引擎和摘要引擎的用法。
  15. Study of digital signature based on elgamal public key system

    公鑰體制的數字簽名研究
  16. Study of multi digital signature based on rsa public key system

    公鑰體制的多重數字簽名研究
  17. Study of digital signature based on ecc - based self - certified public key system

    基於橢圓曲線自證實公鑰的數字簽名研究
  18. The key logs of koal enterprise ca system should contains signature for the validility checking when necessary

    對格爾企業證書認證系統中的關鍵日誌都包含簽名,必要時可對日誌的有效性進行驗證。
  19. It is impossible for the electronic signature technology to resolve the problems of the certainty of the public key and the possibility of the private key holders denying the signed document

    但是如何解決公共密鑰的確定性以及私人密鑰持有者否認簽發文件的可能性問題,則是電子簽名技術本身無法解決的問題。
  20. It is conceivable that future vms and core language libraries will not only optimize public key operations associated with secure connections, but also make the optimization available to general security functions such as digital signature

    可以想象未來的vm和核心語言庫不僅優化與安全連接相關的公鑰操作,而且還使優化可用於一般安全性功能(如數字簽名) 。
分享友人