線體標簽 的英文怎麼說

中文拼音 [xiànbiāoqiān]
線體標簽 英文
label-line,no
  • : 名詞1 (用絲、棉、金屬等製成的細長的東西) thread; string; wire 2 [數學] (一個點任意移動所構成的...
  • : 體構詞成分。
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • 標簽 : label; tag; counter mark; pag; mark; tally; swatch (染布時用); reader; price tag
  1. Selection of secure elliptic curves, implementation of elgamal encrytion and signature over big prime field ; 2. fpga implementation of point multiplication ; 3. at last put forward two blind signature based on ecc, nyberg - rueppel blind scheme and dsa blind scheme, these two schemes can be used in e - cash svstems

    作者所做的主要工作有: ( 1 )實現了安全橢圓曲的選取,實現了基於大素數域上的橢圓曲的elgamal加解密和數字名: ( 2 )設計了量乘的fpga功能模擬; ( 3 )最後提出兩種用橢圓曲密碼制實現的盲名方案,基於ecc的nvberg - rueppel盲名方案和基於ecc的dsa盲名方案,這兩種方案可以用於電子現金系統獲得匿名性。
  2. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲密碼制的優點及研究現狀;其次研究了橢圓曲密碼制的基本理論;第三,分析了橢圓曲密碼的安全性並介紹了密鑰共享,加密,數字名等橢圓曲密碼制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲密碼制時參考;第五,研究了目前流行的計算橢圓曲量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲密碼制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲密碼制;第七,實現了兩條安全橢圓曲上的橢圓曲密碼制,包括ecdh , eces , ecdsa 。
  3. Battery - powered rfid tags are placed on an asset and they communicate with at least three wireless access points inside the network to triangulate a location

    將rfid貼在要跟蹤的物(資產)上,通過至少三個無接入點可以確定物的未知。
分享友人