public key cryptography 中文意思是什麼

public key cryptography 解釋
公共密鑰加密
  • public : adj (opp private)1 公共的,公眾的,公用的;人民的,社會的,國家的;政府的,公營的,公立的。2 (...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • cryptography : n. 密碼學,密碼翻譯術;密寫術。
  1. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications

    公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。
  2. Digital signatures rely on public key cryptography

    數字簽名依賴于公共密鑰加密學。
  3. The public - key cryptography of data encryption

    基於配對函數的對稱加密演算法
  4. The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques

    本文首先對pki體系的底層技術進行深入研究,重點分析了非對稱密碼橢圓曲線密碼體制,並將它與其他密碼技術進行了比較。
  5. This article firstly presents some introductive materials, including public - key cryptography and the motivations and the developments of the elliptic curve cryptosystems

    本文首先介紹了橢圓曲線的研究背景、國內外研究現狀、發展動態以及橢圓曲線密碼技術的歷史與現狀。
  6. In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm

    本文介紹了數據傳輸中公開密鑰演算法中的兩種- rsa加密演算法和diffie - hellman加密演算法
  7. The security of elliptic curve cryptography ( ecc ) depends on the intractability of the elliptic curve analogue of the discrete logarithm problem. ecc has gained increasing popularity in public key cryptography, because of its computation and storage

    橢圓曲線密碼是基於橢圓曲線離散對數難題的一種密碼體制,由於它在運算量和安全性方面的優勢,是目前最具有廣泛應用前景的一種公鑰密碼體制,近幾年一直是人們的研究熱點。
  8. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  9. Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a mac

    由於數字簽名是建立在公用密鑰密碼術基礎上的,因此計算一個數字簽名所花的時間往往要比計算一個mac長得多。
  10. Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography

    加密是確保安全的關鍵技術之一,本文討論了幾種典型的加密演算法,包括分組加密、公鑰加密、散列函數。
  11. The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity

    秘密密鑰密碼體制存在密鑰管理的問題,而公鑰密碼體制在有效解決密鑰管理問題的同時卻又帶來了公鑰真實性的問題。
  12. First , we introduce some basic cryptography theories such as secret - key cryptographypublic - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  13. This article provides a brief description of rsa public key cryptography, an analysis and compare of all kinds of present existed modular exponentiation in rsa public key cryptography, a colligation of the fastest accelerating software algorithm - vlnw sliding window methods and hardware mapping fast montgomery modular multiplication algorithm that can improve the implementary efficiency of rsa public key cryptography for achieving the novel algorithm - mnexp algorithm

    本文簡單介紹了rsa公鑰密碼體制,分析比較rsa公鑰密碼中已有的模冪運算方法,將得到的最快軟體加速演算法vlnw滑動窗口法和硬體映射最快的montgomery模乘演算法綜合,得到改進后的mnexp演算法能有效提高rsa公鑰密碼的實現效率。橢圓曲線密碼系統被認為可以替代rsa演算法的一種公鑰密碼體制。
  14. Dsa public key cryptography using irreversible algorithms for the financial services industry - part 1 : the digital signature algorithm

    金融服務業用的使用不可逆演算法的公用密鑰的密碼.第1部分:數字簽名演算法
  15. Ecc is considered to be an alternative to rsa. this article provides a brief description of rsa public key cryptography and the associated knowledge, in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3, in - depth studies present existed scalar multiplication, further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates, the improved algorithm compatible the advantage of the naf, has the least number of zero window and avoid a large number of inverse operation, successfully reduce scalar multiplication calculation

    本文闡述了橢圓曲線及其相關知識,特別說明了建立在有限域fp (其中p是大於3的素數)上的非奇異橢圓曲線e ,深入研究目前已有的各種標量乘法,由此提出了橢圓曲線密碼演算法在混合坐標下改進的帶符號滑動窗口演算法,該演算法兼容了naf方法的優點,擁有最少數目的非零窗口數,又避免了域元素上的大量求逆運算,較成功地減少了標量乘法計算量。
  16. Security analysis of public - key cryptography based on chaotic attractors of neural networks and its implementation

    基於神經網路混沌吸引子的公鑰密碼演算法安全性分析及其實現
  17. The widespread use of public - key cryptography also requires a public - key infrastructure ( pki ) to publish and manage public - key values

    而廣泛地公鑰演算法則又需要一個公鑰基礎結構( pki )來公布和管理眾多公開密鑰。
  18. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms

    大多數數位簽章系統將公鑰密碼學和密碼雜湊演演算法結合使用。
  19. Public key cryptography for the financial services industry : certificate management

    金融服務業用公共密鑰加密.證書管理
  20. This asymmetry is the property that makes public key cryptography so useful

    這個非對稱的特性使得公鑰加密很有用。
分享友人