Analysis of the Differentials between Private And Public Key Cryptography; The application of symmetrical cryptology in industrial equipment 对称密码加密系统与公钥密码加密系统对称密码学在工业设备保密中的应用
I'm Sophie neveu, French police, cryptology. 我叫索菲奈芙,法国警察,专攻密码学。
Architecture design of cryptology laboratory platform based on component technology and its implementation 基于组件技术的密码学实验平台的架构设计及其实现
Study of information theory and computing complexity in cryptology 密码学中信息论及计算复杂性的研究
Construct of One-way Function Base on Matrices and Its Application in Cryptology 基于矩阵的单向函数构造及其在密码学中的应用
Authenticated key agreement is an important original language of cryptology. 认证密钥协商协议是一种重要的密码学原语。
In this paper, we introduce applied backgrounds, definitions, classifications, constructions of commitment schemes, and their important roles in the cryptology field. 基于信息理论安全的承诺方案和知识的零知识证明协议,构造一个公开可验证的密钥共享方案。
As a divergent subject between Number Theory and the theory of algorithm complexity, Computational Number Theory is quickly developed from the needs of computer science and cryptology. 计算数论是数论和算法复杂性理论的交叉学科,是由于计算机科学和密码学的需求而发展起来的新兴学科。
Research on Improved Elliptic Curve Cryptology Resistant Against Side Channel Attacks 改进椭圆曲线加密算法抗边际信道攻击的研究
The Application of Cryptology Techniques for Copyright Protection in Electronic Publishing 密码技术在电子出版物的版权保护中的应用
The digital picture watermarks system software was developed through research of information hiding, digital watermarks, and cryptology. 在印刷包装企业网络化发展过程中,不可避免地要涉及到数字图像水印系统的开发等问题。
Digital watermarking occurred in such a background, which can make up for the shortcomings of traditional methods of information cryptology. 数字水印技术就是在这个背景下应运而生的,它可以有效地弥补传统信息加密方式的缺点。
Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology. 可验证秘密共享、群签名和知识签名是保护重要而敏感信息的有用工具,常用于设计安全的密码协议。
The decomposition of Boolean functions with its applications in logic network design and cryptology 布尔函数的分解及其在逻辑网络设计和密码学中的应用
Aimed at the complexity of the cryptology algorithm, this article discuss the management using the public key cryptology and the private key cryptology distribution, use the private key cryptology encrypt and decrypt the information which to be delivered. 针对密码算法实现的复杂性,结合私钥密码与公钥密码的特点,讨论了用公钥密码管理和分配私钥的密钥,用私钥密码加密和解密被传送的信息。
But the point is that how is Facebook, how is Amazon possibly going to communicate securely with you or your laptop using cryptology if you both have to know the same secrets. 关键是Facebook是怎么样,亚马逊是怎么样安全地和你或你的计算机,使用加密技术进行交流的,如果你们两个都,知道那个同样的密钥。
The traditional techniques of copyright protection and content authentication are cryptology technique and digital signature technique. 传统的版权保护和内容认证技术是密码技术和数字签名技术。
Cryptology is summarized including cryptography, cryptanalysis and cipher theory. 综述了密码学,包括密码编码学与密码分析学两大分支以及各种密码理论;
In the paper, the data encryption technologies of the classical cipher algorithm ( DES and RSA) are introduced in the modern cryptology. 本文介绍了现代密码学中两个经典密码算法(DES和RSA)的数据加密技术;
Lattice reduction is not only an important task of lattice research but also a powerful tool for cryptology. 格基规约是格理论研究的一个重要内容,也是密码设计和分析中的一个重要工具。
Based on digital watermarking and applied cryptology, an authentication scheme for copyright protection of digital product is proposed. 提出了一种基于数字水印技术和应用密码学的数字产品版权保护认证机制。
Scalar multiplication quickly became the research focus of many cryptology experts and many fairly good results had been obtained. 因此,标量乘的快速算法研究成为了许多密码学家关心的问题,并取得了相当多的不错的成果。
The research and application on cryptology is the core of the information security. 密码理论的研究与应用是信息安全技术的核心研究领域。
Conic curve cryptology was a new orientation of cryptology in the recent research of the cryptology. 在密码学的最新进展研究中,圆锥曲线密码学是密码学发展的一个新方向。
Stream cipher system is an important part of cryptology. 流密码是现代密码学中的一个重要的研究分支。
The Security of multicast communication needs to be confidential and identifiable, which could be achieved by cryptology. 在组播通讯安全上,要求达到机密性和认证性,这主要应用密码学机制来实现。
The research and application of cryptology is one of the core domains of the information security technique. 密码学的研究和应用是信息安全技术的核心领域之一,而椭圆曲线密码体制是近年来密码学领域研究的一个热点,受到国内外学者的广泛关注。
This paper researches chaotic cryptology, proposes and analyzes some new chaotic cryptosystems. 本文对混沌密码学进行了深入的研究,并设计和研究了一些新的混沌密码系统。
Chaos is an important subdiscipline of nonlinear science. Cryptology is an important field of information security. 混沌学是非线性科学的一个重要分支,密码学是信息安全领域的重要学科。
Chaotic cryptology is a subject related to both chaos and cryptology. It is a new subdiscipline of cryptology. 混沌密码学是一个跨域了混沌学和密码学两个领域的学科,是密码学的一个新的分支。