网站首页  词典首页

请输入您要查询的英文单词:

 

单词 public-key cryptography
释义

Public-key Cryptography

美 
英 
  • n.公开密钥加密
  • 网络公钥密码体制;公钥密码学;公开金钥加密法
n.
1.
公开密钥加密

例句

释义:
1.
The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography.
密钥对关系中的互补性本质使得通过公钥加密实现这种唯一标识成为可能。
technet.microsoft.com
2.
The security of public-key cryptography depends on factorization or other difficult mathematical problems.
这种技术之所以安全,是因为应用了因数分解或其他困难的数学问题。
edba.ncl.edu.tw
3.
With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values.
使用了公开密匙加密后,希望接收已加密消息的一方将创建一对密匙值。
www.ibm.com
4.
Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
technet.microsoft.com
5.
Be signed with a strong name using standard public key cryptography.
使用标准公钥密码系统用强名称签名。
msdn2.microsoft.com
6.
The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.
公共密钥密码系统中的保密的密钥,用于对到来的消息解密和对外出的消息签名。
kajaa.bbs.us
7.
Identity-based cryptography is a rapidly emerging approach to public-key cryptography that public keys can be arbitrary identifiers.
基于身份加密是一种以用户的身份标识符作为公钥的加密体制。
www.ceaj.org
8.
Primary interop assemblies must be signed with strong names using standard public key cryptography.
必须使用标准公钥密码系统用强名称为主Interop程序集进行签名。
msdn2.microsoft.com
9.
Unlike public-key cryptography, quantum cryptography should remain secure when quantum computers arrive on the scene.
量子密码术和公开金钥加密法的差别在于,前者在量子电脑出现后仍然牢不可破。
edba.ncl.edu.tw
10.
The transport- layer security standard overcomes the inefficiencies associated with public- key cryptography .
传输层安全性标准解决了与公共密钥加密技术关联的效率低下问题。
www.bing.com
1.
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
www.ibm.com
2.
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
www.winu.cn
3.
The following figure shows the sequence of signing and encrypting with the addition of the supporting elements of public key cryptography.
下图显示在添加了公钥加密的支持元素的情况下进行签名和加密的顺序。
technet.microsoft.com
4.
To use public-key cryptography to digitally sign a message, Alice first applies a hash algorithm to the message to create a message digest.
为了使用公钥加密对消息进行数字签名,小红首先将哈希算法应用于该消息以创建消息摘要。
msdn2.microsoft.com
5.
Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms.
大多数数位签章系统将公钥密码学和密码杂凑演算法结合使用。
www-128.ibm.com
6.
The following figure shows the sequence of decrypting with the addition of the supporting elements of public key cryptography.
下图显示在添加了公钥加密的支持元素的情况下进行解密的顺序。
technet.microsoft.com
7.
The protocol provides a model for importing the ideas of classical public key cryptography into the quantum world.
这个协议也为在量子世界中引入传统的公钥密码技术提供了一个模型。
www.lw23.com
8.
The popular RSA cipher algorithm, widely deployed in public-key cryptography, relies on factorization.
目前在公开金钥加密法中,最常用到的RSA密码演算法,就是应用因数分解的原理。
edba.ncl.edu.tw
9.
Digital signature is one of the most important primitives in public key cryptography.
数字签名在公钥密码学中有着非常重要的地位。
dictsearch.appspot.com
10.
The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography.
而公钥密码算法正好可以解决这方面的问题,但在速度上远远不及对称密码算法。
www.boshuo.net
1.
Public-key cryptography is an inherently different approach to security that doesn't require a shared secret.
公开密匙加密是一种与其他加密有着本质区别的安全方法,它不需要共享的秘密。
www.ibm.com
2.
The two core elements of PKI comprise of public key cryptography and certification authority.
公匙基建的两个核心部分是公开密码匙密码技术及核证机关。
www.info.gov.hk
3.
However, Public Key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
www-128.ibm.com
4.
To set up your secure server, use public key cryptography to create a public and private key pair.
要设置您的安全服务器,使用公共钥创建一对公钥私钥对。
translations.launchpad.net
5.
Certificateless public key cryptography resolves the key escrow problem and public key authentication problem.
无证书公钥密码体制解决了密钥托管问题和公钥认证问题。
www.ceaj.org
6.
The following figure shows the sequence of encrypting with the supporting elements of public key cryptography.
下图显示在具有公钥加密的支持元素的情况下进行加密的顺序。
technet.microsoft.com
7.
The Set Registry tool allows you to change the registry settings for public key cryptography.
设置注册表工具使您得以更改公钥密码的注册表设置。
technet.microsoft.com
8.
Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
www.ibm.com
9.
Elliptic curve cryptography (ECC) is an important subject in the field of public key cryptography .
椭圆曲线密码体制是公钥密码学领域的一个重要课题。
dictsearch.appspot.com
10.
Let us now learn about public key cryptography and how to use it to satisfy the needs of information security.
现在,让我们一起认识公开密码匙密码技术及如何利用它来满足资讯保安的需求。
www.info.gov.hk
1.
Analyze the differentiate about Secret and Public key cryptography in EB .
浅析私钥和公钥加密技术的区别。
www.bing.com
2.
This topic is a high-level introduction to public key cryptography elements that specifically relate to message security.
本主题从较高的层次讲述了与邮件安全明确相关的公钥加密元素。
technet.microsoft.com
3.
PKCS is the Public Key Cryptography Standard - a series of standards created by RSA Labs.
PKCS是公钥加密标准-由RSA实验室创建的一系列标准。
blog.sina.com.cn
4.
of larger-number has universal application in cryptography, and it is the base operation in most public-key cryptography algorithms.
大数模幂在密码学领域有广泛的应用,它是公钥密码的基础。
dict.kekenet.com
5.
Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.
椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。
www.fabiao.net
6.
Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
www-128.ibm.com
7.
The primary disadvantage of public key cryptography is speed.
公共密钥加密的主要缺点是速度。
www-128.ibm.com
8.
RSA is a wide used public-key cryptography algorithm.
RSA是一种被广为使用的公钥加密体制。
kns50.chkd.cnki.net
9.
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
www.ibm.com
10.
Use public-key cryptography, which PHP supports.
请使用PHP支持的公钥加密技术。
www.ibm.com
1.
In public-key cryptography, there is no need to exchange a common key.
在公钥加密中,无需交换公共密钥。
technet.microsoft.com
2.
Public key cryptography represents a major innovation because it fundamentally alters the process of encryption and decryption.
公钥加密是重大的创新,因为它从根本上改变了加密和解密的过程。
technet.microsoft.com
3.
Public key cryptography, on the other hand, uses a pair of keys: one for encryption and one for decryption.
公开密钥加密使用一对密钥:一个用于加密,一个用于解密。
www.ibm.com
4.
The most important supporting concept for message security is public key cryptography.
在邮件安全领域,最重要的支持性概念是公钥加密。
technet.microsoft.com
5.
Public key cryptography is computationally intensive because it is based on complex math.
由于公钥密码术基于复杂的数学理论,所以它是十分耗费计算机资源的。
www-128.ibm.com
6.
Public Key Cryptography for the Financial Services Industry: Extensions to Public Key Certificates and Certificate Revocation Lists
金融服务业用公开密钥加密:公开密钥证书和证书撤消列表的扩展
www.isres.com
7.
Public Key Cryptography for the Financial Services: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography
金融业务的公开密钥加密:使用离散对数密码术的对称密码协议
www.isres.com
8.
Public Key Cryptography for the Financial Services Industry: Certificate Management
金融服务业用公开密钥加密:证书管理
www.mapeng.net
9.
Understanding How Public Key Cryptography in Digital Signatures and Message Encryption Work Together
了解如何将公钥加密同时用于数字签名和邮件加密
technet.microsoft.com
10.
Analysis of the Differentials between Private And Public Key Cryptography
对称密码加密系统与公钥密码加密系统
ilib.cn
1.
security analysis of public - key cryptography based on chaotic attractors of neural networks and its implementation
基于神经网络混沌吸引子的公钥密码算法安全性分析及其实现
www.ichacha.net
2.
Public key cryptography and digitally signing and encrypting of an e-mail message
公钥加密以及对电子邮件进行数字签名和加密
technet.microsoft.com
3.
An Algorithm and Implementation of Elliptic Curve Public Key Cryptography
一种椭圆曲线密码加密算法及其实现
www.ilib.cn
4.
Public key cryptography and digital signing of an e-mail message
公钥加密以及电子邮件的数字签名
technet.microsoft.com
5.
Layer-based Model for Security Protocol Design Using Public Key Cryptography
基于公钥的层次化网络安全协议设计
www.ilib.cn
6.
Public key cryptography and encryption of an e-mail message
公钥加密以及电子邮件的加密
technet.microsoft.com
7.
A Public-key Cryptography Using Integral Quaternions
一种四元整数公钥密码体制
www.ilib.cn
8.
Public Key Cryptography and Message Encryption
公钥加密和邮件加密
technet.microsoft.com
9.
The Public-key Cryptography of Data Encryption
数据加密中的公开密钥算法
www.ilib.cn
10.
Modular multiplier of public-key cryptography for smart cards
智能卡公钥密码体制的模乘器
www.ilib.cn
1.
Public-Key Cryptography Algorithm Based on RSA in Improving Security Stability of Mobile Communication
RSA跟随式公钥大数算法提高移动通信安全稳定性能的研究
www.ilib.cn
2.
Fragile watermarking for image authentication based on image feature and public key cryptography
基于图像特征和公钥密码系统的易损水印算法
www.ilib.cn
3.
A Modular Processor for Multi Public-Key Cryptography
一种适用于多种公钥密码算法的模运算处理器
www.ilib.cn
4.
PKCS Public Key Cryptography Standard
公钥加密标准
blog.csdn.net
5.
Application of Fragile Watermark in the Image Authentication Based on Public Key Cryptography
基于公钥密码学的脆弱水印在图像鉴定中的应用
www.ilib.cn
6.
Secret and Public Key Cryptography
密钥和公钥的密码技术
wenku.baidu.com
7.
Survey and Trend of Public Key Cryptography
公钥密码体制的现状与发展
ilib.cn
8.
How Public Key Cryptography Works
公钥加密的工作原理
technet.microsoft.com
9.
A Software Protection Technique Based on Public Key Cryptography
一种基于公钥密码算法的序列号软件保护方案
service.ilib.cn
10.
Study on Public Key Cryptography
公钥密码体制综述
ilib.cn
1.
A New Public-key Cryptography Based on Chaotic Attractors of Neural Networks
一种新的基于神经网络混沌吸引子的公钥密码算法
www.ilib.cn
2.
A survey of public key cryptography
公钥密码体制研究与进展
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/3/1 3:35:40