cryptography 中文意思是什麼

音標 [krip'tɔgrəfi]
cryptography 解釋
n. 名詞 密碼學,密碼翻譯術;密寫術。

  1. Application of chaos theory in cryptography

    混沌理論在密碼學中的應用
  2. A cheater detectable visual cryptography scheme

    可防止欺騙的可視密碼分享方案
  3. The field that encompasses both cryptography and cryptanalysis

    包含加密技術和密碼分析(學)兩部分的學科領域。
  4. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications

    公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。
  5. Mapping object identifiers to cryptography algorithms

    >將對象標識符映射到加密演算法
  6. Make your software behave : cryptography essentials

    使您的軟體運轉起來:密碼學本質
  7. Digital signatures rely on public key cryptography

    數字簽名依賴于公共密鑰加密學。
  8. Ibm s report of their new cryptography algorithm

    Ibm關于其新密碼術演算法的報告
  9. Contains the information for the cryptography class

    包含有關密碼類的信息。
  10. Cryptography is used to achieve the following goals

    加密用於達到以下目的:
  11. An open - design, open - source cryptography project

    一個開放設計、開放源碼的密碼術項目
  12. The public - key cryptography of data encryption

    基於配對函數的對稱加密演算法
  13. Hash functions are fundamental to modern cryptography

    哈希函數是現代密碼系統的基礎。
  14. The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques

    本文首先對pki體系的底層技術進行深入研究,重點分析了非對稱密碼橢圓曲線密碼體制,並將它與其他密碼技術進行了比較。
  15. This article firstly presents some introductive materials, including public - key cryptography and the motivations and the developments of the elliptic curve cryptosystems

    本文首先介紹了橢圓曲線的研究背景、國內外研究現狀、發展動態以及橢圓曲線密碼技術的歷史與現狀。
  16. A wide range of books on cryptography is available from bookshops, libraries which haven t been reduced through misguided management policies and lack of funds to stocking only meretricious junk, and from various online sources

    可以從那些還未由於誤導的管理策略和缺乏資金而淪落到只賣華麗而庸俗垃圾的書店、圖書館中得到各種有關密碼術的書籍,也可以從各種在線資源獲取。
  17. Later in this article, it is common for developers to use cryptography, but misapply it in ways that destroy the security of the system, or to use encryption that is too weak and can easily be broken

    ) ,開發人員都普遍使用密碼技術,卻以破壞系統安全的方式濫用它;或者使用加密技術,但這些加密技術又太薄弱,很容易被破壞。
  18. Chun - chih peng and chung - huang yang, " design and implementation for integer factorization and primality testing tools with elliptic curve on windows platforms, " 2007 symposium on cryptography and information security, sasebo, japan, january 2007

    張家瀚、楊中皇,支援鏈結機制之標準化時戳實作, 2007知識社群與資訊安全研討會,文化大學, 2007年5月。
  19. Now it is used in cryptography and corrspording field, specially, men study wiretap channel of type ii with maintain secrecy corresponding

    它在密碼學通信領域有著重要的應用,特別是在研究第二竊密通道( wire - tapchanneloftype )時它與保密通信有關。
  20. Partial blind signature based on elliptic curve cryptography ensures that the e - cash is valid only in the period issued by the bank according to the withdrawal protocol, and the historical record of the e - cash that exceeds the valid period will be removed, which greatly reduce the amount of traffic and effort of calculation and improve the efficiency

    在取款協議中採用基於橢圓曲線的部分盲簽名方案,使電子現金包含由銀行頒布的有效期,超過有效期的電子現金歷史記錄將被清除,這樣減少了通信量和計算量,提高了執行效率。
分享友人