encryption and decryption 中文意思是什麼

encryption and decryption 解釋
加密與解密
  1. It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key

    現代密碼學認為,任何加密體系的加密和解密演算法都可以公開,其安全性在於密鑰的保密性。
  2. That will perform the encryption and decryption

    選項可標識將執行加密和解密的
  3. The same key is used for both encryption and decryption

    加密和解密使用相同的密鑰。
  4. Encryption and decryption of data in visual foxpro

    中數據的加密和解密
  5. One special feature of this paper is that it provides fast implementation means for the all kinds of modular exponentiation algorithms, which facilitate the implementation of the rsa public key algorithms. the paper improved the sliding window algorithm by largely reducing the space complexity. meanwhile this paper represents an efficient combined algorithm to improve the processing of encryption and decryption

    大數模冪乘運算是實現rsa等公鑰密碼的基本運算,其運行效率決定了rsa公鑰密碼的性能,文章主要研究了各種模冪演算法的快速實現方法,提出運用組合演算法的思想來減少演算法運行時間;並對滑動窗口取冪演算法進行了部分改進,用線性表來存儲預計算數據,從而減少了演算法的復雜度,進一步提高了rsa加/解密的效率,並在試驗測試中得到較為滿意的結果。
  6. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  7. Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key

    此類非對稱轉換較比使用對稱密鑰進行加密和解密的方法,其開銷更大。
  8. In this dissertation, the pivotal points relating to conditional access system, including the framework of mpeg - 2 system layers, the de - multiplexing of mpeg - 2 system, the service information table of mpeg - 2 and dvb, the encryption and decryption method for digital tv conditional access system, are fully discussed according to the market requisition. there is also a probe into the feasibility and security aspect of the coherent descramble algorithm

    本論文結合市場需要,詳細研究探討了與數字電視有條件接收系統緊密相關的部分關鍵技術,包括mpeg - 2系統層結構分析、 mpeg - 2系統復接技術、 mpeg - 2與dvb中業務信息表分析、數字電視有條件接收加解擾技術
  9. In the design and analysis of block cipher, considering the noncontinuity of encryption and decryption of advanced encryption standard - rijndael algorithm and the arbitrariness of the choice of polynomialm ( x ), we change the modular polynomial and the polynomials used in process of encryption and decryption, which the encryption polynomial and the decryption polynomial are the same polynomials in our choices. the new algorithm have more continuity

    在分組密碼的設計與分析方面:針對美國即將推出的高級加密標準rijndael演算法的加解密的不一致性和rijndael演算法中模多項式的選取隨意性,我們修改了rijndael演算法中的模多項式和加解密所用的多項式,使得加解密取相同的多項式,這樣加密與解密具有更多相容性。
  10. A public private key pair is used for encryption and decryption of messages

    公用私人密鑰對用於加密和解密郵件。
  11. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。
  12. We can rebuild the network packets and encryption and decryption data and many other important operations of network security in the layer. in addition, that can elevate the efficiency of the whole system

    實現了對現有的協議棧增加了過濾層,並且可以在該層中實現封包重組,加密解密等網路安全方面重要的操作。
  13. Cracking a data encryption and decryption system using multi - valued logic array

    對一種基於多值邏輯陣列變換的加解密系統的破解
  14. Namespace to provide encryption and decryption of messages for greater security

    命名空間中的類,以提供消息的加密和解密,從而獲得更高的安全性。
  15. Two distinct and uniquely matched strings of numbers used for encryption and decryption

    兩組既獨立但配對的數字組合,用作加密和解密之用
  16. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全電子郵件的演算法從hash 、簽名到加密、認證進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數字簽名、加密和解密部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶端數字認證模型,並進行了實現。
  17. Then the article introduces the design and realization of user level monitor module and kernel level monitor module detailedly, including how to realize the system clipboard monitor, the file motion control, file print job interdiction, and the directory share monitor in system ’ s user level, how to realize the process accessing filter, the process privilege control, the file encryption and decryption in system ’ s kernel level

    本文詳細給出了用戶層監控模塊和內核層監控模塊的設計和實現,包括如何在操作系統用戶層實現系統剪貼板監控、文件移動控制、共享目錄監控、文件列印阻斷等,如何在內核層實現進程訪問過濾、用戶進程權限控制、文件透明加解密功能。
  18. Keys are used for digitally signing documents and verifying signatures, and they help with the encryption and decryption processes

    密鑰用於數字簽署文檔和驗證簽名,也用於加密和解密過程。
  19. It also examines the application of electronic signature, encryption and decryption, and certification authority, etc., in order to look into the legal feasibility of electronic bills of lading

    本論文並探討電子簽章、加密及解密技術、憑證機構之運作等在電子載貨證券作業之應用,並以法律觀點分析其可行性。
  20. Public - key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption

    公開鑰匙演算法則是不對稱的,採用不同的密鑰,一個公開的鑰匙和一個秘密的鑰匙,用於加密和解密。
分享友人