secret algorithm 中文意思是什麼

secret algorithm 解釋
保密演算法
  • secret : adj 1 秘密的;機密的;隱秘的。2 僻遠的。3 隱藏的;看不見的。4 神秘的;奧妙的;不可思議的。5 隱居...
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. Represents the secret key for the symmetric algorithm

    表示對稱演算法的機密密鑰。
  2. To simulate the preparation of the secret - key, a gaussian random number generator in fpga is designed, which based on the analysis of ziggurat algorithm

    為了模擬密鑰的制備,在分析ziggurat演算法的基礎上完成了高斯隨機數發生器的fpga實現。
  3. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  4. The digital map is usually formed by the water depth ' s database measured on the seabottom. because of the disadvantage that the database is kept secret, this dissertation introduces a new method : first, the depth data are picked up from the electronic chart, then interpolation of the depth datum by kriging algorithm is adopted to gain the digital map. the method is the precondition of the terrain matching when it is researched by simulation, and it is the complement of the database

    通常數字地圖都是通過海底測量的海底水深數據庫來形成,針對水深數據庫存在保密性等特點,本文提出了一種從電子海圖提取水深數據,然後採用kriging方法進行插值形成數字地圖的方法,該方法是進行地形匹配模擬研究的前提,而且它也是海底水深數據庫的一個補充。
  5. Moreover, this algorithm can be implemented very easily in software, and has a good prospect in the fields of secret communication and information security

    此外,本演算法還特別易於軟體實現,在通信保密和信息安全領域具有良好的實際應用前景。
  6. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms用戶權限的加密演算法,該演算法具有公匙和私匙兩個加密參數,通過異或等邏輯運算將用戶口令加密成偽碼再進行存儲。
  7. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  8. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  9. Thus, it is very difficult to decode the hashing algorithm ; the security is enhanced via using the selected matrix and iteration time as the secret keys

    將所選用的矩陣和迭代次數作為浮水印的密鑰,提高了演算法的安全性。
  10. Gets or sets the secret key for the symmetric algorithm

    獲取或設置對稱演算法的機密密鑰。
  11. The secret key to use for the symmetric algorithm

    用於對稱演算法的密鑰。
  12. A secret key algorithm that processes a stream of bits one bit at a time

    一次處理位流中一位的秘鑰演算法。
  13. The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack

    初始字是藍牙安全系統的第一道安全屏障,如果初始字被攻擊者得到,攻擊者就可以通過監聽兩設備的后續通訊進而獲得兩設備的公共鏈路字,如果兩設備的公共鏈路字為第三方知曉,那麼兩設備對于第三方面而言就毫無安全性可言。第三方不但可以偷聽兩設備的加密通訊,還可以冒充其中一方向另一方鑒權。
  14. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。
  15. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密散列數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排列碼加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。
  16. Typically, public - key encryption is used to encrypt a key and iv to be used by a secret - key algorithm

    公鑰加密通常用於加密一個私鑰演算法將要使用的密鑰和iv 。
  17. If the sharing secret algorithm based on chinese remainder theorem is expanded by database watermark, full watermark information can not only be recovered only with a part of watermark, but also the data for watermark can be reduced, moreover the performance can be improved significantly

    通過研究發現,如果將基於中國剩餘定理的秘密共享思想加以擴展后應用於數據庫水印演算法,不僅能夠基於部分數據恢復水印信息,而且水印數據的擴張大量減少,演算法性能有更進一步的提高。
  18. This protocol uses the theory of pu blic - key to build a security channel, and then uses the secret session - key to encrypt the data. the security protocol can assure that the data is transported in security through the link. finally, the author described two cipher algorithm which used in t he encryption module

    該協議結合單鑰加密體制和雙鑰加密體制的優點,利用雙鑰體制對通信雙方進行身分認證並確定每次會話的會話密鑰,然後使用會話密鑰對傳輸數據進行加密,從而保證了通信數據在線路上的安全性。
  19. Secondly, because the system is vulnerable in the process of key producing and signing, we apply a distributed rsa algorithm to the key producing process and adopt a structure of two - level secret shares storing the private key to improve its security

    其次,根據系統在私鑰產生和簽名階段易受攻擊的特性,將分散式rsa演算法應用到私鑰的產生過程,並在簽名過程中採用雙層共享結構存儲私鑰,以提高私鑰的安全性。
  20. It has important potential applications in copyright protection of digital media, secret communication and hidden annotation of host data. facing with this problems, aims of this paper will mainly focus on following aspects : 1. combined with the logistic mapping in non - linearity dynamics system, an image - encrypting algorithm based on modular arithmetic in wavelet transform is designed

    本文在前人工作的基礎上,針對當前數字水印和圖象加密的發展狀況,完成了以下工作: 1 、從多媒體數據安全的角度,分析了多媒體信息的特點,深入研究和分析了數字圖象加密技術。
分享友人