cryptanalysis

cryptanalysis

1. Side-channel attack is a new cryptanalysis,and the current cryptographic algorithms are vulnerable to higher-order side-channel attack.

1概述传统意义上的密码系统的安全性主要由算法复杂度决定。

2. Differential and Linear Cryptanalysis of AC Block Cipher

AC分组密码的差分和线性密码分析

3. One key problem in the cryptanalysis of GSM authentication algorithm COMP128 is identified and analyzed.

COMP128算法是GSM协议采用的认证算法。

4. DES consequently came under intense academic scrutiny, and motivated the modern understanding of block ciphers and their cryptanalysis.

DES因此遭到激烈学术审议,激励现代理解分组密码及密码翻译法。

5. Cryptanalysis of He-Wu signature scheme[J].Journal of Beijing University of Posts and Telecommunications,1999,22(4):6-8.

He-Wu数字签名方案的攻击方法[J].北京邮电大学学报,1999,22(4):6-8.

6. Linear Cryptanalysis of LOKI97

LOKI97的线性密码分析

7. Vulnerability cryptanalysis

n. 弱点密码分析

8. SAFER++ is selected for further evaluation in NESSIE second phase. A technique which connects differential cryptanalysis and nonlinear cryptanalysis is used to attack 4,5 and 6 rounds of SAFER++.

SAFER + +是进入NESSIE第 2轮评估的 7个分组算法之一 采用差分密码分析和非线性密码分析相结合的方法对 4轮、5轮和 6轮SAFER + +进行分析 ,结果表明 :6轮SAFER + +对这种攻击方法不免疫 ;

9. SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.

SPN结构是一种流行的分组密码总体结构;差分和线性分析是攻击分组密码的最强有力的方法。

10. Cryptanalysis of the TAE Mode and Its Improvement

TAE模式的分析和改进

11. Cryptanalysis of the Vesta-2M stream cipher

Vesta-2M流密码的密码分析

12. XSL algorithm is introduced for the cryptanalysis of block ciphers by Nicolas Courtois and Josef Pieprzyk, derived from XL.

XSL算法是Courtois和Pieprzyk在分析分组密码时,在XL算法的基础上提出的一种新的算法。

13. Cryptanalysis and Improvement of a Signcryption Scheme with Public Verifiability

一个可公开验证签密方案的密码分析和改进

14. Cryptanalysis of a Remote Password Authentication Scheme

一个远程口令鉴别方案的分析

15. Cryptanalysis of Some Provably Secure Signature Schemes

一些可证安全签名方案的密码学分析

16. The Cryptanalysis of a Quantum Key Distribution and Authentication Protocol Through Once Quantum Communication

一次量子通信量子密钥分发和认证协议的安全性分析

17. Cryptanalysis of a proxy multisignature scheme

一种代理多重数字签名方案的安全性分析

18. Cryptanalysis and improvement of a WTLS handshake protocol with user anonymity and forward secrecy

一种具有用户匿名性和前向安全性的WTLS握手协议的安全性分析及其改进

19. Cryptanalysis of a Dynamic Threshold Group Signature Scheme

一种动态门限群签名方案的安全性分析

20. Cryptanalysis of multiple chaotic systems based public key encryption technique

一种多混沌系统公钥密码算法的安全性分析

21. Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme from Bilinear Pairings

一种门限代理签名方案的分析与改进

22. CRYPTANALYSIS OF A CLASS OF CHAOTIC STREAM CIPHERS

一类混沌流密码的分析

23. Cryptanalysis and improvement of a threshold proxy signcryption scheme

一类门限代理签密方案的分析与改进

24. impossible differential cryptanalysis

不可能差分分析

25. Cryptanalysis and improvement of two threshold signature schemes

两种门限签名方案的密码学分析及其改进

26. Intermediate Cryptanalysis Course

中级密码分析课程

27. This paper presents a ciphertext-only cryptanalysis of A 5/2 ciphering algorithm in GSM encrypted communication.

主要介绍一种针对GSM系统中的加密算法A5/2算法的实时唯密文攻击算法。

28. They are weak in resisting cryptanalysis because of the lack of nonlinear transformation in systems.

从密码分析的角度看,由于不具有非线性变换,密码的混淆能力不强,容易被攻击。

29. algebraic cryptanalysis

代数分析

30. Keywords Information security;information hiding;cryptography;cryptanalysis;chaos;chaotic cipher;block cipher;watermarking;

信息安全;信息隐藏;密码学;密码分析;混沌;混沌密码;分组密码;数字水印;

31. public-key cryptanalysis

公开密钥体系

32. Cryptanalysis of data encryption scheme based on arithmetic coding

关于一种算术编码数据加密方案的密码分析

33. partition linear cryptanalysis

分区线性分析法

34. Partition linear cryptanalysis for block cipher

分组密码的分区线性分析法

35. The field that encompasses both cryptography and cryptanalysis.

包含加密技术和密码分析(学)两部分的学科领域。

36. In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

在数学,物理和信号处理中频率分析是一种分解函数,波形,或信号的频率组成以获取频谱的方法。

37. Cryptanalysis of one-off blind public key based on ID

基于ID的一次性盲公钥的密码学分析

38. Cryptanalysis of the remote login authentication scheme based on the geometric approach

基于几何方法的远程登录认证方案的密码分析

39. Cryptanalysis of Key Agreement Scheme Based on Generalised Inverses of Matrices

基于矩阵广义逆的密钥协同方案的分析

40. Cryptanalysis on generalization of threshold signature and authenticated encryption for group communications

基于群组通信的通用阈值签名和鉴别加密技术分析

41. Cryptanalysis of an Identity-Based Verifiably Encrypted Signature Scheme

基于身份的可验证加密签名协议的安全性分析

42. Differential cryptanalysis of multiple round characteristics

多图特征的差分密码分析

43. multiple linear cryptanalysis

多重线性密码分析

44. Construction of linear approximation equations in multiple linear cryptanalysis

多重线性密码分析中线性逼近方程的构造

45. In cryptanalysis, a pair of consecutive letters.

密码分析中一对连缀的字母对。

46. In cryptanalysis, a pair of consecutive letters. In statistical attacks on ciphers the known frequency of various bigrams, in a given language, can be used in attempts to break the cipher.

密码分析中一对连缀的字母对。在对密码的统计攻击中,可用已知语言的各双字母组的频度来攻破密码。

47. In cryptanalysis, a triple of successive letters

密码分析中的一组三个连续字母。

48. cryptanalysis attack

密码分析攻击

49. Password encryption algorithm is the antithesis of cryptanalysis, that is, deciphering the technical studies.

密码加密算法的对立面就是密码分析,也就是破译技术研究。加密与破译是一对矛盾,了解破译对研究加密非常必要。

50. The study of cryptanalysis or cryptography.

密码学研究密码分析或密码学的学科

51. password cryptanalysis of Hash functions

密码杂凑函数

52. Keywords cipher algorithm;cryptography;wireless network;cryptanalysis;authentication mode;one-way hash function;security;pseudo-randomness;statistical evaluation;whiteness test;

密码算法;密码编码;无线网络;密码分析;认证模式;单向散列函数;安全性;伪随机性;统计评估;白化测试;

53. Cryptanalysis of a Variant of a Cellular Automata Based Cryptosystem

对一个基于细胞自动机的分组密码变形的分析

54. Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme

对一种门限代理签名方案的密码分析及改进

55. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes

对两个可转变认证加密方案的分析和改进

56. A differential cryptanalysis of the iterated block cipher based on the new round function is presented.

对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。

57. Cryptanalysis of Proxy Multi-signature, Multi-proxy Signature and Multi-proxy Multi-signature Schemes from Bilinear Pairings

对来自双线性配对的三种代理签名体制的密码学分析

58. STUDY ON THE COMPUTATION OF DIFFERENTIAL CHARACTERISTIC PROBABILITY IN DIFFERENTIAL CRYPTANALYSIS

差分分析中的特征概率计算问题研究

59. The Applications of Differential Cryptanalysis in Sequence Cipher Attack

差分分析在序列密码攻击中的应用

60. differential cryptanalysis

差分密码分析

61. The Application of SPRT in Cryptanalysis

序贯概率比检验在密码分析中的应用

62. circulating relations of linear cryptanalysis

循环逼近式系统

63. An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.

指出了使用大规模的基于全奇异矩阵的代替置换网络可有效地提高分组密码抗差分密码分析的安全性。

64. Through the cryptanalysis of a threshold proxy signature scheme based on bilinear pairings, it was found that the scheme couldn't resist forgery attack and public-key substitute attack.

摘要对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。

65. Through the cryptanalysis of an ID-based threshold signcryption scheme from bilinear pairings, it is found that the scheme can not resist forgery attack.

摘要对一种基于身份的门限签密方案进行了密码分析,发现该方案不能抵抗伪造攻击。

66. In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide and attack sample.

摘要给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。

67. Cryptanalysis of the Data Information Disordering Algorithm

数据置乱算法的分析

68. Digital Forensic Tools: Imaging, Cryptanalysis, Steganalysis, Data Recovery.

数码法医工具:成像,密码分析,信息隐藏检测,数据恢复。

69. "Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology."

整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。

70. Side - channel cryptanalysis

旁路分析(侧信道分析)

71. Cryptanalysis of Aydos'mutual authentication and key establish ment protocol for wireless communication

无线通信相互认证和密钥建立协议的安全性分析

72. In this paper, the Sequential Probability Ratio Test (SPRT) is introduced to cryptanalysis to reduce the amount of keys needed in correlation attacks.

本文把序贯概率比检验引入到密码分析中,用来约减相关攻击所需的密钥量。

73. Keywords Chaos;Information Security;Cryptography;Cryptanalysis;Chaotic stream Cipher;

混沌;信息安全;密码学;密码分析;混沌序列密码;

74. Keywords Chaos;Cryptography;Information Security;Chaotic Cipher;Cryptanalysis;matrix transformation;

混沌;信息安全;密码学;混沌密码;密码分析;矩阵映射;

75. Keywords Chaos;Cryptography;Information Security;Block Cipher;Chaotic Cipher;Cryptanalysis;Digital Watermark;

混沌;密码学;信息安全;分组密码;混沌密码;密码分析;数字水印;

76. Second, the leap forward in unsupervised learning fits in with his work on cryptanalysis;

第二,在无监督式学习方面的跃进和图灵的密码方面工作符合;

77. security cryptanalysis

算法安全性分析

78. The strong security to all known cryptanalysis ensures the encryption of both letter information and non-letter chinese character information.

算法有较高的安全性,能够抵抗现有的密码分析方法,它既适合字母文字信息的加密,也适合非字母的中文信息对称加密。

79. The designers claim that 5-round SAFER++ is secure against differential cryptanalysis.

算法的设计者称5轮SAFER++算法可以抵抗差分分析。

80. Linear cryptanalysis

线性密码分析

英语宝典
考试词汇表