cryptology

cryptology

1. - Collection of cryptology pointers.

+ :一堆加密相关的连接。

2. Apply Dixon Resultants in Cryptology

Dixon结式在密码学的应用

3. The Application of DNA Computation in Cryptology

DNA计算在密码学上的应用

4. The application of k-order quasi-Bent functions in cryptology and communication fields

k阶拟Bent函数在密码设计和通信中的应用

5. PKI technology is based on the modern cryptology, which authenticate user through issue digital certificate for them.

PKI技术依赖于现代密码学的公开密钥算法,通过颁发数字证书认证用户,是目前国内外流行的主流安全技术之一。

6. A Grid Computing Model for Cryptology

一种网格环境下的密码计算模型

7. To apply theory of cryptology to solve information security effectively,a system have been designed to bind public key and entity info,that is PKI(Public Key Infrastructure).

为了将密码学的理论投入实际应用之中并有效地解决安全问题,人们设计了一种机制来解决公钥与实体身份之间的绑定问题,这就是PKI(即公共密钥基础设施)。

8. To understand the potential, it has been praised by one of Microsoft's prominent critics as "one of the most significant contribution to computer security since cryptology.

为了理解它 的潜力,一位微软著名的评论家指出“这是自加密技术出现以来对计算机安全最重要的贡献之一”。

9. The latest forensic science, cryptology, modern archaeology, and investigative chemistry are put to work in this search of the real man to whom modern man owes so much.

为什么牛顿要从事骗人的炼金术,而这件事蒙蔽了人们达三百年之久?

10. This paper analyzes the conditional access system based on the cryptology and the information security.

从密码学的角度及信息安全的角度对数字电视条件接收系统进行了分析。

11. conventional cryptology

传统密码术

12. Cryptology is used for controlling the illegal duplication and distribution.

传统版权保护技术主要用于控制内容的非法复制和传播。

13. Cryptology is the key technology of information security, which can be divided into three types: stream cipher, symmetrical cipher and asymmetrical cipher.

信息安全的核心技术是密码技术,它基本上可以分为三类:流密码、对称密码和非对称密码。

14. public key cryptology

公钥密码

15. The feature's analysis of cryptology for one kind of non-linear Boolean function

关于一类非线性布尔函数的密码学特性分析

16. After the system parameters are reset,the improved algorithm then gains its stronger ability to resist the zero divisor attack and holds ideal semantic property in cryptology as well.

其次通过重新配置系统参数,改进后的加密算法既能提高抵抗零因子攻击的能力,又能保持密码学意义上的理想语意特性。

17. Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology.

可验证秘密共享、群签名和知识签名是保护重要而敏感信息的有用工具,常用于设计安全的密码协议。

18. Therefore, the associated technology of the traditional cryptology and the modern information hiding, may better guarantee information itself and its transmission process secure.

因此,将传统的密码学技术与现代的信息隐藏技术相结合,就可以更好的保证信息本身的安全和信息传递过程的安全。

19. In the numerous fields of the information technology, cryptology is playing an important role.

在信息技术的众多领域中,密码学都在发挥着重要的作用。

20. The digital picture watermarks system software was developed through research of information hiding,digital watermarks,and cryptology.

在印刷包装企业网络化发展过程中,不可避免地要涉及到数字图像水印系统的开发等问题。

21. The Research and Realization of Cryptology Based RSA and other Encryptions

基于RSA等算法软件加密技术的研究与实现

22. The Research of Cryptology Based Machine Fingerprint Property

基于机器指纹等特性对软件加密技术的研究

23. Virtual Laboratory of Cryptology based on Components(VLCC)

基于组件的密码学虚拟实验室

24. In the cryptology,the Hash function can be used in the data integrity and the news authentication as well as the digital signature,SHA-256 is one kind of Hash function which is used the most widespread.

密码学中Hash函数能够用于数据完整性和消息认证以及数字签名,SHA-256是使用最广泛的一种Hash函数。

25. Many problems in the cryptology can be represented as optimizationproblems in mathematics.

密码学中的大量问题在数学上可以表现为困难的优化问题。

26. In cryptology , the art or science that treats of the principles, means and methods for rendering plaintext unintelligible and for converting encrypted messages into intelligible form.

密码学中,将明文转变为不可能理解的密文和反过来将密文转变为可理解形式的方法、手段、理论的一门科学或技巧。

27. Without doubtful, Cryptology is a important research work in the domain of information security.

密码学作为信息安全领域的重要内容不容置疑。

28. A REVIEW ON THE RESEARCH AND DEVELOPMENT OF CRYPTOLOGY

密码学研究与发展简述

29. The cryptology becomes a hotspot of information high-tech as the key technology of secure communication.

密码技术作为保密通信的关键技术已成为当代信息高科技的热点。

30. Cryptology is one of core techniques of information security.Cryptology can provides confidentiality, authentication, integrity, and non-repudiation.

密码技术作为信息安全的核心技术之一,能有效保障信息的机密性、认证性、完整性和不可否认性。

31. The Application of Cryptology Techniques for Copyright Protection in Electronic Publishing

密码技术在电子出版物的版权保护中的应用

32. Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields.

密码技术是信息安全领域的核心技术,在当今社会的许多领域都有着广泛的商业应用前景。

33. Cryptology can be divided into three types: stream cipher, symmetrical cipher (block cipher) and asymmetrical cipher (public-key cipher) and it is the key technology of information security.

密码算法是信息安全技术的核心,大概可以分为三类:序列密码,对称密码(分组密码),以及非对称密码(公钥制密码)。

34. symmetric cryptology

对称密码

35. The application of symmetrical cryptology in industrial equipment

对称密码学在工业设备保密中的应用

36. The decomposition of Boolean functions with its applications in logic network design and cryptology

布尔函数的分解及其在逻辑网络设计和密码学中的应用

37. Tompa M, Woll H. How to share a secret with a cheater[ D ]. Journal of Cryptology, 1988,1 (2) :133 -138.

张福泰,王育民.无条件安全的广义可验证秘密分享协议[J].计算机研究与发展,2002,39(10)1199-1024.

38. JAKOBSSON. A practical mix [C]. Advances in Cryptology -EUROCRYPT ' 98, volume 1403 of Lecture Notes in Computer Science,pages 448-. Springer-Verlag, 1998

张莉,吴振强:一种分布式的洋葱路由新机制;计算机应用,2003年12月第23卷第12期

39. RSA and ECC are two widely used public key cryptosystems.According to today's cryptology theory, ECC will have more applications in the future than RSA.

摘要RSA和ECC是目前广泛使用的两种公钥体制,根据现在的研究结果,ECC的应用前景比RSA更好。

40. The block cipher is an important branch of the modern cryptology and has broad application and important theoretical value because of the naissance and development of the block cipher.

摘要分组密码是现代密码学中的一个重要分支,其诞生和发展有着广泛的实用背景和重要的理论价值。

41. Research on Improved Elliptic Curve Cryptology Resistant Against Side Channel Attacks

改进椭圆曲线加密算法抗边际信道攻击的研究

42. "Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology."

整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。

43. A Study of Cryptology in the Bounded Storage Model

有限存储模型的密码学研究

44. This article aiming at the digital image, has mainly discussed the Human Vision System (HVS) and the method of cryptology in the application of the information hiding aspects.

本文主要针对数字图像,探讨了人类视觉系统(HVS)和密码学方法在信息隐藏方面的应用。

45. This paper describes course design and teaching method of cryptology in the major of computer science at Future University-Hakodate according to my experience.

本文根据笔者在日本公立函馆未来大学从事博士后研究的亲身经历,介绍该校面向计算机专业硕士生开设的密码学课程的内容设置与教学方法。

46. This paper roundly introduces the RSA arithmetic of asymmetric cryptology system.

本文针对非对称密码系统RSA算法的实现作了较全面的介绍。

47. Conditional access system is an important part of digital TV system.It is also an application of cryptology.

条件接收系统是数字电视的关键部分,也是密码学的一种应用。

48. Because ECC is more secure, less computational-complex, more efficient, needing less storage and occupying less bandwidth, it is becoming the most popular research direction in cryptology.

椭圆曲线加密系统,由于它具有安全性能更高、计算量小、处理速度快、存储空间占用小和带宽要求低等一系列优点,因此成为了当今公开密钥领域的研究热点。

49. Just as the famous expert of cryptology Bruce Schneier said that the random sequence is the problem which is discussed very less in cryptology, but it is the most important one in cryptology.

正如著名的密码学家Bruce Schneier所说:“随机序列是谈论最少的密码学问题,但没有哪个问题比这个问题更重要”。

50. Primary Analysis on Cryptology Date

浅析数据加密技术

51. Assistant Chief of Naval Operations for Communications and Cryptology

海军作战部助理部长(负责通信与密码)

52. Keywords Chaotic system;Synchronization control;Unified chaotic system;Chaotic cryptology;Secure communication;

混沌系统;同步控制;统一混沌系统;混沌密码学;保密通信;

53. M. Ito, A. Saio, T. Nishizeki, Multiple Assignment, Scheme for Sharing Secret, In Journal pf Cryptology Vol.6, No.1, pp.15-20, 1993.

王旭正,以平方模数为安全基础之层次性动态存取控制,中央警察大学资讯管理学研究所论文,民国89年。

54. contemporary cryptology

现代密码学

55. Using artificial neural network to solve the questions about computer cryptology will be an important study field of neural network and will bring a new clew to cryptology.

用人工神经网络解决计算机密码学中的问题,即神经密码学,不仅是神经网络的一个重要的应用研究领域,而且也将给密码学理论提供一种全新的思路。

56. For the useful data need to betransported through network, cryptology technology must be used to protect all kinds ofmanagement information from vicious attack.

由于要在网络链路上传输数据,所以需要运用密码学技术来保证各种管理信息的安全性,同时利用身份认证技术防止非授权用户通过启动本系统达到非法目的。

57. cryptology of telecommunication

电信保密技术

58. ZHANG Yi-hui; XU Li; CHEN Si-sheng(Key Laboratory of Network Security and Cryptology; Fujian Normal University; Fuzhou Fujian 350003; China);

福建师范大学网络安全与密码技术重点实验室;

59. Air Force Cryptology Support Center

空军密码支援中心

60. Synthesizing the current cryptology technique, this article use the safety DES and AES which has been international accepted as the private key cryptology, use RSA as the public key cryptology.

综合现有的密码技术,本文使用国际公认安全的DES和AES作为私钥密码,使用RSA作为公钥密码。

61. Based on compter cryptology analysing security on cryptographic system in banking networks of outlands now.Then introduce two cryptographic techniques duing EFT.That are RSA orthodox key and others.

网络业衰退带来的是许多未婚者更加努力地在个人生活中建立长久的婚恋关系。

62. Quantum cryptology is one of the nearest study tasks in cryptology technology, its development do active promotion to the progress of cryptology theory.

而量子密码术是密码学技术的较新的研究课题,它的发展对推动密码学理论发展起了积极的作用。

63. Although he failed in that examination, to my pitiful, I am sorry to hear that he also didn’t pass the cryptology and the operating system(2th times).

自从上了小学后每年都会和爸妈吵着要出家,直到上了高中以后父亲才稍许理解了我的愿望。一个埋藏在我心底深处的成佛度人的愿望。

64. This information provided British Naval intelligence with what it needed to crack the German cryptology system.

英国海军情报机构要想获得情报的话就必须破译德国人的密码系统。

65. As a divergent subject between Number Theory and the theory of algorithm complexity, Computational Number Theory is quickly developed from the needs of computer science and cryptology.

计算数论是数论和算法复杂性理论的交叉学科,是由于计算机科学和密码学的需求而发展起来的新兴学科。

66. computer cryptology

计算机密码学

67. "The essential difference between this technology and cryptology is that the latter conceals the content of information itself while the former conceals the very existence of information.

该技术与密码技术之不同点在于:密码技术隐藏信息的“内容”,而信息隐藏技术则隐藏信息的“存在性”。

68. The essential difference between steganography and cryptology is that the latter conceals the content of information itself while the former conceals the very existence of information.

该技术与密码技术之不同点在于:密码技术隐藏信息的“内容”,而隐秘通信技术则隐藏信息的“存在性”。

69. modern cryptology

近代密码学; 现代密码学

70. communication cryptology

通信代码

71. M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology: Eurocrypt ’93, pp386-397, 1993.

邱善福,新视觉化密码编码法的分析,国立交通大学资讯科学所硕士论文,民国89年。

72. Yang Yixian, Lin Xuduan. Coding Theory and Cryptology (In Chinese). People's Post and Telecommunications Press, Beijing,China, 1992

郑伟谋,郝柏林.实用符号动力学.上海:上海科技教育出版社,1994

73. Quantum cryptology

量子密码学

74. quanta cryptology technique

量子密码技术

75. Quantum cryptology is a new method for secret communications.This new method utilizes the quantum nature of single photons.

量子密码术是一种实现秘密通信的新方法,它利用单光子的量子性质,借助量子密钥分配协议可实现数据传输的可证性安全。

76. threshold cryptology

门限密码学

77. To Analyze Anthropology about Cryptology"laoda" "qinzi" "sanhao"

隐语"老大"、"亲自"、"三号"的人类学浅析

英语宝典
考试词汇表