cryptogram

cryptogram

1. ESP can accomplish data confidentiality and limited traffic flow confidentiality by applying cryptogram algorithm to encrypt all the data and padding. Besides, it can also provide the functions above mentioned that the AH owned.

ESP协议通过使用密码算法对IP数据报的全部数据和填充的内容进行全加密,来实现数据保密和有限的数据流保密,还可以提供与AH协议相同的认证等服务;

2. Implement and Research of The RSA Public Cryptogram Algorithm

RSA公钥密码算法的研究与实现

3. RSA cryptogram

RSA密码

4. RSA algorithm is an influential public-key encrypt algorithm at present,which can resist almost all cryptogram attack as yet.

RSA算法是目前较有影响的公钥加密算法,它能够抵抗目前已知的大部分密码攻击。

5. VPN technology is a virtual private network technology which use the cryptogram knowledge in the establishment of open public networks.

VPN技术是利用有关密码学知识在开放的公共网络上建立虚拟专用网络的技术。

6. New Grouping Double-Key Cryptogram Scheme

一种新的分组双密密钥密码方案

7. Strand space model is a new formal analysis tool to the analysis of cryptogram protocol.

串空间模型是一种新兴的密码协议形式化分析工具。

8. For improving security of voice in its transportation,chaotic signal is taken as a key and added in the phonetic signal to form a cryptogram.

为了加强语音传输的安全性,利用混沌的特性,把混沌作为加密钥加入到语音信号中形成密文,并从此密文中剔除混沌信号将语音信号还原,从而实现了对实时语音的加密解密处理。

9. public key cryptogram

公钥密码

10. public key cryptogram system

公钥密码体制

11. Public key cryptogram

公钥密码;

12. Improved Digital Signature Cryptogram Agreement Using Hash

利用Hash函数改造的数字签名密码协议

13. Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.

加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。

14. Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function.

加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。

15. Encryption can be divided into symmetry cryptogram and public key cryptogram in terms of the difference between encryption key and decryption key.

单纯的采用对称密码体制或公钥密码体制在信息安全方面有诸多的不适之处,很难满足信息安全的要求。

16. isometric cryptogram

同构密报

17. 1. The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.

在传输方面,采用已通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。

18. After analyzing the advantages and the disadvantages of DSE arithmetic and RSA arithmetic, which are both representatives of the traditional cryptogram systems, put forward a model of network data safety system combined two arithmetic.

在分析对称密码体制和公开密钥体制的代表DSE和RSA算法的优缺点后,提出将两种算法结合的网络数据安全系统的模型。

19. Implementation of AES Cryptogram Based on LSI

基于大规模集成电路的AES密码计算的实现

20. Implementation of Trusted Computing in Commercial Cryptogram Based on Hardware

基于硬件系统的商用密码可信计算实现方法

21. In recent years, research and design of crypt security chip is a very popular subject in the cross field between cryptogram and micro-electronics.

安全加密芯片的研究与设计,是当前密码学和微电子学交叉学科领域的主要研究方向和难点。

22. cryptogram residue class

密文剩余类 密码残余等级

23. cryptogram space

密文空间

24. Security of the cryptogram system

密码体系的安全性

25. cryptogram reproduction

密码复制

26. cryptogram storage

密码存储

27. Cryptogram and Computer Network Security

密码学与计算机网络安全

28. technology of cryptogram

密码技术

29. cryptogram copy

密码拷贝

30. cryptogram - modle

密码模型

31. cryptogram management

密码管理

32. cryptogram destruction

密码销毁

33. symmetric cryptogram

对称密码

34. Symmetry cryptogram

对称密码;

35. This system, which covers the management of in-and-out of books, inventory, employee data, supplier data, and cryptogram deployment, is mainly programmed to manage stock books in book storehouse.

摘 要本系统主要完成对图书仓库的库存管理,包括图书入库、出库、库存,员工信息,供应商信息以及密码管理等六个方面。

36. 3. This paper has expounded on several typical cryptogram algorithms, and analyzed and summed up the implementation procedure of the cryptogram algorithms based on C-Language.

摘要阐述了几种典型的密码算法及其应用,分析总结了密码算法的C语言实现过程。

37. A government uses a cryptogram or secret code.

政府使用密码或暗号。

38. Keywords digital watermarks;digital picture watermarks system;information hiding;cryptogram;copyright;print and package;

数字水印;数字图像水印系统;信息隐藏;密码;版权;印刷包装;

39. The digital signature is different from traditional signature,it is based on public key cryptosystems and is constructed by cryptogram arithmetic.

数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。

40. Lastly, the mixed cryptogram arithmetic was implemented and applied into the application of email encryption.

最后,实现了混合加密算法,并将其应用于加密发送电子邮件中。

41. In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced.

本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。

42. The paper is studying the security arithmetic theory of smart card, including the symmetry cryptogram arithmetic(DES,AES),dissymmetry cryptogram arithmetic(RSA,ECC),hash function, Digital Signature.

本文研究了智能卡安全算法理论,包括对称密码算法(DES,AES),非对称密码算法(RSA,ECC),散列函数,数字签名。

43. Cryptogram technology is the core one among technologies of network security, and it is the most direct, effective, efficient and important way for solving the problems of network security.

根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。

44. Furthermore,the rationality and feasibility of mix cryptogram were proved by analyzing the efficiency, complexity and security.

此外,通过对混合加密算法进行效率、复杂度和安全性的分析,论证了其合理性和可行性。

45. Communication manager, which is established in the connection of TCP by cryptogram, can transmit.

此系统可以分布在网络中任意数目的主机上。

46. Because of the unsuitable of using onlysymmetry cryptogram or public key cryptogram, it could hardly fulfill the informationsecurity requirement。

由于单纯采用对称密码或公钥密码体制,在信息安全方面存在诸多不适之处,很难满足信息安全的要求。

47. Research and Application of Cryptogram Technology in Network Security

网络安全中的密码技术研究及其应用

48. American Cryptogram Association

美国密码技术协会

49. Considering RSA is one of the most popular public key cryptogram algirithms, a new group signature scheme completely based on RSA is proposed.

考虑到RSA是应用最广泛的公钥密码体制之一,首次基于RSA设计出一种群签名方案。

50. Computer Cryptogram Algorithms and the Implementation Based on C-language

计算机密码算法与C语言实现

51. The Cryptogram Technology for Computer Network Security

计算机网络安全中的密码技术

52. cryptogram telephone

话密机

53. Common security technologies used in authentication include cryptogram technology, message digest, digital signature, and digital certification and so on.

身份认证中常用的安全技术包括密码技术、消息摘要、数字签名和数字证书等。

54. Software and data’s safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.

软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。

55. Progress in Quantum Cryptogram Communication Research

量子密码通信研究进展

56. The Security of Baoking Computerizatioo Calling for Commercial Cryptogram Standard

银行电子化安全呼唤商用密码标准

英语宝典
考试词汇表