public-key encryption 中文意思是什麼

public-key encryption 解釋
公用鑰加密
  • public : adj (opp private)1 公共的,公眾的,公用的;人民的,社會的,國家的;政府的,公營的,公立的。2 (...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • encryption : 編成密碼
  1. Public - key encryption has a much larger keyspace, or range of possible values for the key, and is therefore less susceptible to exhaustive attacks that try every possible key

    公鑰加密具有更大的密鑰空間(或密鑰的可能值范圍) ,因此不大容易受到對每個可能密鑰都進行嘗試的窮舉攻擊。
  2. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  3. Two parties alice and bob might use public - key encryption as follows

    雙方(小紅和小明)可以按照下列方式使用公鑰加密。
  4. The critical operation in public - key encryption is verifying the identity of a message s recipient, so as to encrypt with the correct public key

    其中我們最喜歡的一個就是用於秘鑰加密演算法的「百萬位密鑰」廣告。
  5. This paper proposes a new public - key encryption scheme which removes one element from the public - key tuple of the original cramer - shoup scheme

    這里的標準模型指的是不利用隨機預言機這一工具來論證體制安全性的模型。
  6. Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption

    公鑰加密是使用一對非對稱的密鑰加密或解密的技術。
  7. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )密鑰隔離公鑰加密的一般模型和安全性定義,提出基於cdh假設的強( t , n )密鑰隔離公鑰加密方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  8. Springer - verlag, 2003, pp. 85 - 99. 4 kurosawa k. multi - recipient public key encryption with shortened ciphertext. lecture notes in computer science 2274, naccache d, paillier p eds.,

    方法3雖然比方法2有更短的密文,但是其加密和解密是串列的,且計算量等同多次獨立加密的計算量。
  9. The embedment of the text proclaimed in writing in elliptical public - key encryption system is studied theoretically and a general algorithm is designed

    對橢圓公鑰密碼體制中的明文嵌入進行了理論研究,設計了一個通用的演算法。
  10. Public - key encryption asymmetric cryptography

    公鑰加密(不對稱加密)
  11. A new public - key encryption scheme

    一種新的公鑰加密方案
  12. Public - key encryption

    公鑰加密
  13. For more information, see the section on public - key encryption, later in this topic

    有關更多信息,請參見本主題後面的有關公鑰加密的部分。
  14. The. net framework provides the following classes that implement public - key encryption algorithms

    . net framework提供以下實現公鑰加密演算法的類:
  15. Cryptographic analysis of a group key management scheme based on a public - key encryption algorithm

    對一種基於公鑰加密演算法的組密鑰管理方案的密碼分析
  16. Typically, public - key encryption is used to encrypt a key and iv to be used by a secret - key algorithm

    公鑰加密通常用於加密一個私鑰演算法將要使用的密鑰和iv 。
  17. Because of these problems, secret - key encryption is often used in conjunction with public - key encryption to privately communicate the values of the key and iv

    由於存在這些問題,私鑰加密通常與公鑰加密一起使用,來秘密地傳達密鑰和iv的值。
  18. 1 bellare m, boldyreva a, micali s. public key encryption in a multi - user setting : security proofs and improvements

    方法1需要為臨時的組產生一對公私鑰對,還要分發密鑰,操作復雜,不適合現場實施。
  19. And use bna logic theories to prove the completeness and validity of the improved protocol. 4 on the base of former research, a new model of user authentication system is designed based on the improved kerberos protocol and public key encryption system

    並採用ban邏輯理論證明改進協議的完備性、有效性; 4 、提出了基於改進kerberos協議和公鑰密碼體制的身份認證服務的模型,並給出模型的實際應用。
  20. Provides programming elements for public key cryptography standards pkcs, including methods for signing data, exchanging keys, requesting certificates, public key encryption and decryption, and other security functions

    包含authenticode x . 509 v . 3證書的公共語言運行庫實現。此證書用唯一明確標識證書持有者的私鑰簽名。
分享友人