public key cryptography

英 [ˈpʌblɪk kiː krɪpˈtɒɡrəfi] 美 [ˈpʌblɪk kiː krɪpˈtɑːɡrəfi]

网络  公钥加密; 公钥密码系统; 公开密钥加密; 公钥加密术; 公钥密码体制

计算机



双语例句

  1. This approach involving private and public key pairs is also known as public key cryptography.
    这种涉及到私钥和公钥对的方式也被称作公钥密码术。
  2. Public Key Cryptography is fundamentally based upon a public/ private key pair.
    公钥密码术(PublicKeyCryptography)从根本上讲是基于公钥/私钥对的。
  3. Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
    数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
  4. Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
    由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个MAC长得多。
  5. The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
    公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
  6. Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
    很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
  7. Public key cryptography, on the other hand, uses a pair of keys: one for encryption and one for decryption.
    公开密钥加密使用一对密钥:一个用于加密,一个用于解密。
  8. Public key cryptography represents a major innovation because it fundamentally alters the process of encryption and decryption.
    公钥加密是重大的创新,因为它从根本上改变了加密和解密的过程。
  9. Analysis of the Differentials between Private And Public Key Cryptography; The application of symmetrical cryptology in industrial equipment
    对称密码加密系统与公钥密码加密系统对称密码学在工业设备保密中的应用
  10. Private key updating scheme of identity-based public key cryptography under distributed network
    分布式网络中基于IDPKC的私钥更新方案
  11. Fragile watermarking for image authentication based on image feature and public key cryptography
    基于图像特征和公钥密码系统的易损水印算法
  12. For more information about this signing operation, see "public key cryptography and digital signatures" in understanding public key cryptography.
    有关此签名操作的详细信息,请参阅了解公钥加密中的“公钥加密和数字签名”。
  13. The following figure shows the sequence of decrypting and verifying the digital signature with the addition of the supporting elements of public key cryptography.
    下图显示在添加了公钥加密的支持元素的情况下对数字签名进行解密和验证的顺序。
  14. Without public key cryptography, it is doubtful that there would be practical message security solutions, due to the fact that key management before public key cryptography was cumbersome.
    如果没有公钥加密,那么是否存在实用的邮件安全解决方案是值得怀疑的,因为在公钥加密出现之前,密钥管理是一件很麻烦的事情。
  15. This paper discusses the application of public key cryptography to the digital signature, especially to digital multisignatures.
    介绍了公开钥密码体制在数字签名中的应用,特别是集体签名问题。
  16. The most important supporting concept for message security is public key cryptography.
    在邮件安全领域,最重要的支持性概念是公钥加密。
  17. The scheme perfectly integrates digital signature scheme with public key cryptography system.
    该方案是数字签名与公钥密码体制的有机集成。
  18. This asymmetry is the property that makes public key cryptography so useful.
    这个非对称的特性使得公钥加密很有用。
  19. Status and Trend of Public Key Cryptography
    公钥密码理论与技术的研究现状及发展趋势
  20. RSA is a public key cryptography method, which includes RSA key generation, encryption and decryption of data.
    RSA算法是一种公钥密码算法,实现RSA算法包括生成RSA密钥,加密和解密数据。
  21. In the first paper, I discuss the development and basic concepts of cryptology. Emphases I introduce the theory and some representative arithmetic of public key cryptography.
    论文的前一部分介绍了密码学的发展和基本概念,并重点介绍了公开密钥密码体制的原理和一些经典算法。
  22. In this paper, The principles of Digital Signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
    文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
  23. One Way functions play an important role in complexity theory of computation and public key cryptography.
    One-Way函数在计算复杂性和密码技术中均有重要的应用。
  24. First of all, symmetrical cryptography and public key cryptography have made great achievements.
    首先,密码学中已经实现了对称加密算法和公钥加密算法。
  25. Based on self-generated certificate public key cryptography system, we design an end-to-end key agreement protocol.
    在密钥协商方面,基于自生成证书公钥密码体制,设计出了一种端到端密钥协商协议。
  26. An overall introduction of three new chaos-based public key cryptography algorithms is given in this dissertation.
    本文的主要成果包括:1.对最新出现的三种混沌公钥密码算法进行了介绍和分析。
  27. Although the system has been used and developed, but they are also based on traditional public key cryptography.
    虽然这些体系已经得到应用和发展,但他们都是以传统的公钥密码作为基础。
  28. Proxy cryptography, which is an important research field of public key cryptography, includes two parts: proxy digital signature and proxy cryptography.
    代理密码学,是公钥密码学的一个重要研究领域,它包括代理数字签名和代理密码系统两个部分。
  29. In public key cryptography, key is a key pair composed by a public key and a private key.
    在公钥密码学中,密钥是由公开密钥和私有密钥组成的密钥对。
  30. It has solved the problem of the traditional certificate existence problem in public key cryptography system that is based on PKI technology; meanwhile it has also solved the identity-based cryptography key escrow problem. 2.
    该体制是基于身份的公钥体制的变种,解决了传统的基于PKI技术的公钥密码体制中的证书存在问题,而且解决了基于身份密码体制中密钥托管问题。