Cryptograph Sending Based on the ECC Discrete Logarithm 基于椭圆曲线离散对数认证的密文传送
Design and Implementation of Elliptic Curve Cryptograph in Prime Field on Smart Card 素数域椭圆曲线密码在智能卡上的设计与实现
Research on the "One-Group-One-Cipher" Cryptograph of Block-Cipher Based on Chaotic 基于混沌的一组一密分组密码算法研究
A Method of Data Tamper Locating and Recovery by Using Digital Fingerprint and Cryptograph 基于指纹密文的数据篡改定位与恢复方法
Cryptograph: a system of secret or cipher writing; a cipher. 密码:一种秘密的或用密码书写的系统;密码。收藏。
Quantum cryptograph has extraordinary adaptability to the optical communication and unconditional security which classical cryptography has been striving for. 量子密钥分配特别适合光通信环境,而且可以实现无条件安全性。
But the cryptograph algorithms cost too much CPU time, which decrease the throughput of the VPN Gateway. 但是加密算法占用大量的CPU资源,降低了VPN网关的吞吐量。
The article analyzes and designs two kinds of database encryption systems in different layers, puts forward two projects: the management of dynamic key and the query of cryptograph database, and puts one of them into practice. 分析设计了两种不同层次的数据库加密系统,提出了动态密钥管理和密文数据库查询检索方案,并将其中一种方案予以实行。
Then discusses the encryption algorithms and applications of computer cryptograph. 接下来讨论了现代计算机密码学中各种加密算法及其在PKI中的应用。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol. 利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
The key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph. 这种方案的核心思想是在传输效率和传输保密性上取得更加实用性的平衡。
Research and Application of Data Cryptograph Coding Technology in Network Communication 数据密码编码技术在网络通信中的研究及其应用
Cryptograph computing needs great computing ability. The grid computing is a new computational technology. 密码计算需要强大的计算能力,而网格计算作为一种新型有效的计算技术,能广泛集合网络上的资源形成一台虚拟的超级计算机。
Design and implementation of control system of computational node in grid for cryptograph computing 密码计算网格的计算节点控制系统设计与实现
An application environment isolation security architecture was put forward. Security administration center and cryptograph administration center were used as its foundation, user real identity authentication was its core, and the access permission verification was its means. 提出了以安全管理中心和密码中心为基础、以用户真实身份认证为核心、以访问权限检验为手段的应用环境隔离安全体系结构。
Reading module read the cryptograph from USB and decrypt, submit the decrypted data to user process. 文件数据读取模块对于那些来源于USB接口的密文数据,自动进行相关的解密操作,并最终把明文页面提交给上层的用户进程。
The distributed computing for some other cryptograph computing tasks are carried out by the system. 此系统在DES穷举攻击实验中取得了非常好的效果,其它一些密码计算任务类似地也可用此系统分布式地实现。
This paper presents a system of the network security, which is based on the public key cryptograph, and has a wide application in the automation of military commanding. The problems of the RSA public key cryptograph in practice are also analyzed in this paper. 介绍了一种基于RSA公钥密码的网络安全系统,该系统可以在军事指挥自动化过程中广泛应用,同时对RSA公钥密码系统在实际应用中的一些问题进行了分析。
Cryptograph of block encryption appear one bit error, whole block cannot comeback. 块加密的密文出现一位错误,整个块都不可能正确解密。
A Network Security System Based on the Public Key Cryptograph 基于公钥密码的一种网络安全系统
VPN Gateway uses cryptograph algorithms to protect network information. 虚拟专用网(VPN)的网关使用加密算法保护网络信息。
In order to share encrypt data in users, a technology project based on encrypt key digital envelope is designed and UML sequence diagrams are put forward to show the process of encryption, decryption and adding new user in cryptograph sharing. 为在不同用户之间共享密文数据,设计了一套以密钥数字信封为核心的技术方案,并给出了密文共享中的加密、解密、增加共享人过程的UML交互图。
The symmetrical key cryptograph system have the single key to implement encryption and decryption fast. 公开密钥密码体制则拥有公开密钥和私有密钥,加、解密过程不同。
Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. 公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。
A Neural Network Method for Deciphering the Public Key Cryptograph 破译公钥密码的一种神经网络方法
Writing module encrypts the data to cryptograph and write them on USB storage equipment. 对于那些需要通过USB接口写回存储设备的数据,写入模块把明文数据进行加密,最后把密文数据写入USB存储设备。
The study on the theory and design method of chaotic cryptographic technique will provide new clues and directions for cryptograph. 研究混沌密码技术的理论和设计方法,可以为密码学的研究提供新的思路和发展方向。
This approach provides a set of inference rules for reduction and analysis of signature and cryptograph. 新方法中的推导规则既简单便捷同时又具有分析签名和分析密文的能力。
Cryptograph can ensure the integrity and non-repudiation of information not only provide the confidentiality, also it can prevent the tampering and forgery of information. 密码学不但能够提供信息的保密功能,而且还可以确保信息的完整性和不可否认性,能有效地防止信息的篡改和伪造。