cryptographic function

网络  加密函数; 密码函数

计算机



双语例句

  1. If the device only performs a simple cryptographic function, all of the objects must be managed by the software.
    如果设备只执行简单的密码功能,则所有对象必须由软件来管理。
  2. JCA defines a series of Engine classes, where each Engine provides a cryptographic function.
    JCA定义了一系列引擎(Engine)类,其中每个引擎提供一种密码功能。
  3. Both balancedness and correlation immunity is one of the most important cryptographic characteristics of a Boolean function to which have gotten many researches respectively.
    平衡性和相关免疫性是函数的两个重要密码特性,但目前对两者之间的关系还没有得到很好地研究。
  4. In cryptography, the result of securing a block of data by applying a cryptographic function.
    利用加密函数对数据块加密的结果。没有经加密的数据。同plaintext。
  5. The value of the cryptographic function cannot be compromised or modified without access to the session key.
    如果无法访问会话密钥,则无法损害或修改该加密函数值。
  6. Signcryption is a cryptographic primitive that combines both the function of digital signature and encryption in a logical single step.
    签密体制能够在一个逻辑步骤内完成数字签名和加密两项功能。
  7. Analysis of the security of the data encryption techniques In cryptography, the result of securing a block of data by applying a cryptographic function.
    应用数据加密技术对数据库数据加密的探讨利用加密函数对数据块加密的结果。
  8. With the achievement of the chaos synchronization, the more and more attentions are paid to the cryptographic communication, in which the carrier is chaotic signal with good cryptic function, unpredictability, high complexity.
    混沌信号具有隐蔽性、不可预测性、高复杂度和易于实现等特性,随着混沌同步的实现,利用混沌信号作为载波进行保密通信越来越受到广泛的关注。
  9. Originated from study on cryptographic one-way Hash function, σ-LFSR is the outcome of mutual combination and mutual penetration of stream cipher and Hash function design rationale and technology.
    σ-LFSR来源于对密码学中Hash函数的研究,它是序列密码和Hash函数设计原理相互结合、相互渗透的产物。
  10. A cryptographic system based on reconfigurable FPGA can rebuild up circuit according to different cipher in order to implement different function.
    基于可重构技术的加/解密系统,可以使得逻辑电路根据不同的密码算法的需求,重新组织,构成不同的电路结构,实现不同的功能,从而匹配不同的密码算法。
  11. Based on the requirements of message authentication code ( MAC) in current network communication, this paper introduces the cryptographic secure properties of a Hash function, and analyses its applications in message authentication and the main attacks against a Hash function.
    基于当前网络通信中对报文鉴别码(MAC)的需求,介绍了Hash函数在密码学上的安全性质,分析了Hash函数在报文鉴别中的应用和针对Hash函数的主要攻击。
  12. In cryptographic design, people often use the method of iterative principle of cryptographic function to give the cryptographic algorithm.
    在密码编码学中,经常利用密码学函数迭代技术来实现密码算法,其所依赖的理论基础包括相关免疫理论,扩散准则,雪崩原理等。
  13. Information Analysis of Iterative Principle of Cryptographic Function
    密码学函数迭代原理信息论分析
  14. Based on the multi-path reinforcement scheme, q-composition scheme and one-way cryptographic hash function, random key predistribution algorithm ( RKP) was introduced to guarantee a high accuracy and security and a low energy consumption on the same time in large-scale sensor network.
    同时通过引入以q合成、多路增强与单向密钥序列技术为基础的随机密钥预分配协议,可以在大规模传感器跟踪网络的使用中同时达到提高跟踪精度、安全性和降低能耗的目的。
  15. Through the control method of extending cryptographic application specific instruction set, a scheme of cryptographic function extension is designed, providing accelerator engines for data encryption and decryption of special cryptographic algorithm.
    通过扩展密码协处理指令集控制方式设计了一种密码功能扩展方案,为特定密码算法的数据加解密提供了协处理加速引擎。
  16. In this dissertation, the probability of successful attack was optimized, and then a heuristic algorithm of cryptographic hash function based on probability distribution of source information was proposed. The heuristic algorithm is been simulated and estimated through simulation results.
    通过对攻击成功概率进行最优化,提出了基于信源概率分布的加密哈希函数设计函数的启发式算法,并对启发式算法进行了仿真,通过算法的仿真结果评估了该优化算法的具体性能。
  17. The cryptographic hash function is a class of foundational cryptographic algorithms, and it is widely used in the modern communications, financial works, secure computing and many other fields.
    密码杂凑函数是一类基础密码算法,在现代通信、金融、安全计算等许多领域有着极为广泛的应用。
  18. The unequally probable distribution of source information is taken into account to design the cryptographic hash function in this dissertation. Compared with traditional cryptographic hash function, the probability of successful attack of the optimized hash function is greatly reduced.
    本文考虑利用发送信息的不等可能概率分布来设计加密哈希函数,与传统加密哈希函数设计相比,攻击成功的概率大大减少。
  19. People proved how rotation symmetric Boolean functions can be efficiently used in a cryptographic hash function many years ago. Since then, rotation symmetric functions have proven to be very useful in a few fields of cryptography.
    很多年前已经有人证明了旋转对称布尔函数可以有效地应用在加密的哈希函数上从此,旋转对称函数被证明了在密码学的几个领域内都非常有用。
  20. The traditional design of cryptographic hash function assumed that the information to be sent are equally probable events which means the amount of source information is smallest from the perspective of information theory.
    传统的加密哈希函数的设计都假设需要发送的信息都是等可能发生的,从信息论的角度出发,一般信源的信息量是最小的。
  21. The advantage of public key cryptography is removing the request of sharing secrete information in security communication. But in general most of public key cryptographic function operates in very large algebraic structure which means expensive algebraic operation.
    公钥密码体制在安全通信中的最大优势就在于去掉了对双方分享秘密信息的要求,但公钥密码体制大多建立在大的代数结构中,这就意味着需要昂贵的代数计算。