標準密碼演算法 的英文怎麼說

中文拼音 [biāozhǔnyǎnsuàn]
標準密碼演算法 英文
dsca dect standard cipher algorithm dect
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ名詞1 (標準) standard; guideline; criterion; norm 2 (目標) aim; target Ⅱ動詞1 (依據; 依照)...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 標準 : (衡量事物的準則; 榜樣; 規范) standard; criterion; benchmark; pip; rule; ètalon (衡器); merits
  1. Camellia is one of standard block cipher algorithms in the nessie project

    Camellia是歐洲nessie計劃2003年公布的分組之一。
  2. Having been studied and analyzed by cryptologist for over 10 years all over the world, pgp algorithm has been regarded as of security, high efficiency and operability. consequently, series of pgp ' s standard for application to protect e - mail came out. now a great deal of pgp ' s commercial software or free software has been developed

    經過十多年世界范圍的應用研究和分析家們的分析, pgp被認為是安全、高效和易於實現的加,形成了應用於保護電子郵件的一系列,並且有相當多的商業軟體和免費軟體被相繼開發。
  3. The principles of erasure codes used under binary erasure channels are summarized and erasure codes which belong to standard classes of rs codes are introduced with emphasis on cascaded low - density erasure codes with linear time encoding and erasure recover algorithms. thresholds of regular degree distributions are analyzed. it is shown that low - density erasure codes based on ( d, 2d ) - regular sequences of degree distribution are not close to optimal ( d 3 ). two pares of irregular degree distribution sequences are introduced and a pare of improved right regular sequences of low - density erasure codes are presented, it is testified that the new sequences are asymptotically quasi - optimal. in the meantime, simulations of cascaded low - density erasure codes based on a few types of special sequences of degree distribution available are given, together with performance analyses on these codes

    闡述了應用於刪除通道下的糾刪基本原理,介紹了兩類的rs類糾刪,重點分析了具有線性時間編和恢復的漸近好?級聯型低度糾刪,分析了正則度分佈的閾值,對正則低度校驗在刪除通道下的糾錯性能進行了模擬,從理論上證明了基於( d , 2d ) -正則度序列的低度糾刪都不是漸近最優( d 3 ) ,同時還分析了非正則低度校驗的度序列設計,基於右邊正則序列提出了一種改進型右邊正則序列,證明了此序列為漸近擬最優的,對基於幾類現有典型度分佈序列的級聯型低度糾刪進行了模擬模擬及性能分析; 3
  4. Parsing certificate is anthetication to a user and process of getting information. research and developing pki certificate discriminator make us iucubrate pki and standard algorithm in cryptography so it is significance both in theory and practice

    解析數字證書就是對用戶身份的認證和用戶公鑰的提取過程,研究和開發pki數字證書鑒別器,促使對pki體系和的深入研究,具有理論和實踐上的雙重意義。
  5. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加rijndael進行了比較深入的研究,內容包括:從布爾函數、 walsh譜和代數結構的角度對其s盒性質進行的研究,簡化的攻擊方以及的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方,具有簡潔、易於編程實現、確而快速的特點,應用於des獲得與公開文獻相符的結果,應用於rijndael首次求出其s盒布爾函數表達式。
  6. This paper discusses the smart card decryption scheme which is used for conditional access ( ca ) system. the main contents of this paper are as follows : chapter 1 gives an overview of the worldwide studies of the smart card technology and ca technology, and put forward the direction of this dissertation

    第二章,結合課題需要,系統地研究了智能卡的基本原理及其相關國際,分析了有條件接收( conditionalaccess , ca )技術的基本原理和數字視頻廣播( digitalvideobroadcasing , dvb )中的ca關鍵技術,對系統涉及的des及rsa進行了概述。
  7. In the design and analysis of block cipher, considering the noncontinuity of encryption and decryption of advanced encryption standard - rijndael algorithm and the arbitrariness of the choice of polynomialm ( x ), we change the modular polynomial and the polynomials used in process of encryption and decryption, which the encryption polynomial and the decryption polynomial are the same polynomials in our choices. the new algorithm have more continuity

    在分組的設計與分析方面:針對美國即將推出的高級加rijndael的加解的不一致性和rijndael中模多項式的選取隨意性,我們修改了rijndael中的模多項式和加解所用的多項式,使得加解取相同的多項式,這樣加與解具有更多相容性。
  8. Erasure codes which belong to standard classes of rs codes and their erasure correcting principles are introduced with emphasis on cascaded low - density erasure codes with linear time encoding and erasure recover algorithms. the encoding and decoding complexities of these codes are analyzed. 2

    介紹了的rs類糾刪及其糾刪原理,重點介紹了具有線性時間編和恢復的漸近好?級聯型低度糾刪,分析了這幾類糾刪的編譯復雜度; 2
  9. With the fast development of internet, the problem of information security looks increasingly important. then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced. compared with some other public key cryptosystems, elliptic curve cryptosystem ( ecc ) has many merits, so the special attention is paid to it by the network safety specialist in the world. ecc is widely argued because of no standard source code. in this article, the research is on the ecc theory and the implementation of it is also done

    隨著網際網路的快速發展,信息安全問題顯得日益重要。相關網路安全協議應運而生,而它們的基礎都是安全高效的加,橢圓曲線加系統與其他公鑰加系統相比有許多優點,受到國內外安全專家的極大關注。可是橢圓曲線加系統( ecc )並無公開的源代,還處于「百花齊放,百家爭鳴」的局面,文章對于安全的橢圓曲線加系統做了理論研究和實現工作。
  10. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方以及常採用的防範對策; 2研究了ipsec的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解機制以及,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌的文獻資料,了解目前混沌的研究動態和成果,研究混沌體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌體制進行了實現,並為它編寫測試代評估其性能。
  11. 3. the only non - linear part of the algorithm ? s - box is researched in the view of multi - output boolean function, and the algebraic expression and boolean function expression of the s - box are obtained. after analyzing a series of the cipher properties of the s - box, the inner course that camellia could be chosen as european block cipher standard and could withstand many attack ways effectively is revealed

    3 .從多輸出布爾函數這一角度對此中唯一的非線性部件? s盒進行了研究,得出了s盒的代數表達式和布爾函數表達式,並通過對s盒的一系列性質的分析,揭示了camellia被選為歐洲普通型分組並能抵抗多種攻擊方的內在原因。
  12. We have discovered that the switch between frame and field has a close relationship with the motion activity of images. besides, paff in different standards has its own characteristics. the two points mentioned above can be used as guiders for the design of the algorithm in this paper

    本文對mpeg - 2和h . 264中的paff技術進行了深入研究,發現編方式的選擇與圖像運動劇烈程度切相關,且不同的幀場選擇方式有其自身的特點,這兩點對本文的設計具有借鑒意義。
  13. Besides, all taxpayers passwords are stored in the department in encrypted format with the use of industry standard encryption technology

    此外,稅務局將以合符業界的加將納稅人的通行儲存。
分享友人