encryption schemes 中文意思是什麼

encryption schemes 解釋
加密機制
  1. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  2. Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family ( cff )

    我的翻譯是:基於多項式和「 cff 」的絕對安全的非對稱性加密方案。
  3. National institute of standards and technology launched the campaign of selecting advanced encryption standard in april 1997, and then proclaimed the rijndael algorithm as the final advanced encryption standard on october 2, 2000. next, europe started new european schemes for signatures, integrity, and encryption even more large in january 2001

    1997年4月,美國國家標準技術研究所發起了徵集高級加密標準演算法的活動,並於2000年10月2日公布了最終的高級加密標準演算法? ? rijndael演算法。
  4. In addition, the grid application must handle both symmetric and asymmetric encryption schemes

    此外,網格應用程序必須處理對稱及非對稱的加密方案。
  5. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和密碼學;對相關數學理論進行了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取橢圓曲線上的隨機點的關鍵步驟,和ieeep1363的方法相比,它有易於軟體實現、效率高等優點,在國內外相關文獻上還未見到更好的求解方法;接著討論了橢圓曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取安全曲線及基點的步驟;文章還設計了橢圓曲線加密系統的加解密方案,討論了橢圓曲線系統的安全性問題。最後文章就koblitz曲線加密系統進行了軟體實現。
  6. This paper first analyses and summarizes the status quo and evolution trend of encryption, and introduces in detail the development of private - key cryptosystem and public - key cryptosystem, and provides the brief analysis of a few typical schemes

    本文首先對密碼技術的發展現狀及其發展趨勢進行了分析和綜述,詳細的介紹了私鑰密碼系統和公鑰密碼系統的發展,並給出了一些典型的加密體制的簡要分析。
  7. Ideal functionality for identity - based encryption schemes

    基於身份的公鑰加密的理想功能
  8. Based on learning the existing security schemes, an encryption scheme supporting secure in - network processing for wireless sensor networks was introduced

    在研究現有的安全方案的基礎上,提出了一種支持安全網內處理的無線傳感器網路加密方案。
  9. Processing flow, security encryption and certification schemes are described by the electronic commerce ( e - commerce ) protocol, which holds great promise for secure and successful transactions

    電子商務協議定義了交易的實現流程和所採用的安全加密及認證技術等,它是電子商務交易安全順利完成的前提。
  10. 16 bellare m, desai a, pointcheval d, rogaway p. relations among notations of security for public key encryption schemes

    因此,有必要在基於身份的環境中設計出安全且高效的多解密者短密文加密方案。
分享友人