A Study on Theory and Computer Simulation of Quantum Cryptography 量子密码的理论研究及其计算机仿真
Prove elementary properties of modular arithmetic and explain their applications in Computer Science, for example, in cryptography and hashing algorithms. 验证“模算术”(一种整数的算术系统)的基本性质和解整数系统性质释它在计算机科学中的应用,如在密码学和散列算法。
Shoup's main research interests and contributions are computer algorithms relating to number theory, algebra, and cryptography. 他的主要研究方向以及贡献是在与数论、代数学以及密码学有关的计算机算法上面。
In the domain of computer science, MIT faculty and researchers made fundamental contributions to cybernetics, artificial intelligence, computer languages, machine learning, robotics, and cryptography. 在计算机科学领域,麻省理工学院的教授和研究人员作出的贡献基本控制论,人工智能,计算机语言,机器学习,机器人技术和加密技术。
Computer Networks 'Security Mechanisms of Authentication Based Public Key Cryptography 计算机网络中基于公钥密码的安全认证技术
The Implementation on Computer for Super-Long Number of Combinations and Its Application in Cryptography 超大组合数的计算机实现技术及其在密码学中的应用
The Communication Between DSP and Computer The Implementation of Elliptic Curve Cryptography on DSP Chips 椭圆曲线密码体制在DSP上的实现
Also, for a computer system, two types of unconditional security generalized ( k, n) color visual cryptography scheme are proposed. 同时针对计算机系统还给出两种无条件安全的广义(k,n)彩色视觉密码方案。
This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology. 本文第一章分析计算机网络的安全性,介绍保障计算机网络安全的基本技术,指出密码技术是网络安全技术的核心。
With the development of computer technology, encrypted systems are cracked from time to time although classical cryptography is effect to protect information safety. 尽管传统的保密方法保护信息安全行之有效,但是随着计算机技术的发展,加密系统被破译的情况时有发生。
The third period: modern cryptography period, the computer has made many highly complex operation can be operated, so cryptography get more vigorous development. 第三时期:现代密码学时期,现在计算机的出现使得很多高度复杂的运算成为了可能,这样加密手段得到更蓬勃的发展。
As the computer hardware and calculation methods are improved greatly, the required keys length of RSA public-key cryptography is getting longer and longer, which leads to the necessary cost higher and higher. 随着计算机硬件及计算方法的不断改进,RSA公钥密码系统所需的密钥长度越来越长,这导致计算所需代价越来越高。
In recent years, the field of computer science has a rapid development. Parallel computing and distributed computing technology, which dramatically improve the way scientific research, make cryptography no exception. 近些年来,计算机领域迅猛发展,并行计算、分布式计算等技术极大地改变了人们的科学研究方式,加速了各个领域的发展速度,密码学也不例外。
Over the past few decades, following the tremendous challenges and opportunities in communication security brought about by computer technology, cryptography has been taking greater role in information security. 在过去的几十年里,由于计算机技术的蓬勃发展给通信安全带来了巨大的挑战和机遇,密码学在信息安全领域的作用日趋显著。
Recently, with the development of quantum cryptography, the classical cryptosystems are going to face great threat after the quantum computer growing up. So more and more people pay their attention to the cryptography based on noncommutative groups. 近年来,由于量子密码理论的诞生,经典的密码解决方案在量子计算机成熟后会面临重大威胁,于是人们将更多的注意力投向了基于非交换群的密码体制。
The last 20 years, with the universal application of computer networks and communication technology, the certification system has rapid development and has become an important research contents in cryptography. 最近二十多年来,认证系统随着计算机网络和通信技术的普遍应用而迅速发展起来,它己经成为密码学研究的一个重要内容。
The rapid development of the computer network and multimedia information network has reached unprecedented width and depth. But at the same time, convenient and efficient information exchange has also brought information security risk. Conventional cryptography is unable to meet the current needs of information security. 计算机网络的飞速发展,使得网络上的多媒体信息的交流达到了前所未有的广度和深度,便捷的信息交换同时也带来了信息安全方面的隐患,传统的密码学已经不能满足当前信息安全的需要。
With the other hand, the rapid development of computer science and technology, the security of public key cryptography is increasingly being challenged. 另一方面随着计算机科学技术日新月异的发展,公钥密码学的安全性越来越受到挑战。