public-key encryption

英 [ˈpʌblɪk kiː ɪnˈkrɪpʃ(ə)n] 美 [ˈpʌblɪk kiː ɛnˈkrɪpʃən]

网络  公钥加密; 公共钥匙加密; 公开秘钥加密; 公开金钥加密法; 公开键加密

计算机



双语例句

  1. Users of public-key encryption have a private key and a public key, and they share their public keys with other users.
    使用公钥加密的用户拥有一个私钥和一个公钥,并且他们与其他用户共享公钥。
  2. With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
    对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
  3. See Resources for links to more information on digital certificates and public-key encryption in general.
    参见参考资料获得有关数字证书和公开密匙加密的更多信息的链接。
  4. If you have a public-key encryption system, you can have it add an electronic signature to a document.
    如果有了公开密钥加密系统,就可以对文档加上电子签名。
  5. A New Public-key Encryption Scheme Without Random Oracles
    一种新的不含随机预言模型的公钥加密方案
  6. Research on Public-Key Encryption Algorithm Based on Chaos Theory
    基于混沌理论的非对称加密算法研究
  7. Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption.
    公开钥匙加密法解决了管理几个钥匙的问题,但是与常规加密相比,公开钥匙加密慢些。
  8. Conditions for anonymity in some generic public-key encryption constructions
    几个通用公钥加密方案的匿名性条件
  9. Encryption algorithm using the IDEA and RSA algorithm, the main consideration to symmetric encryption efficiency and the security of public-key encryption;
    加密算法采用成熟的IDEA和RSA算法,主要考虑到对称加密的高效性和公钥加密的安全性;
  10. Using Public-key Encryption to Protect Binding Update of Mobile Nodes
    用公开密钥加密方式保护移动节点的绑定过程
  11. Through analysing the period of torus automorphisms which is a prototype of chaotic map, and making use of the framework of the traditional public-key algorithm RSA, the authors propose a chaotic public-key encryption algorithm based on torus automorphisms.
    通过分析典型的混沌映射环面自同构的周期,利用传统公钥算法RSA的架构,设计了一种基于环面自同构的公钥加密算法。
  12. Cryptographic Analysis of a Group Key Management Scheme Based on a Public-key Encryption Algorithm
    对一种基于公钥加密算法的组密钥管理方案的密码分析
  13. A New Simple Probabilistic Public-key Encryption Scheme
    一种新的概率公钥加密体制
  14. Public-key encryption ( PKE) and Public-key Digital Signature ( PKDS) based on IC cards provide operational and reliable solutions for uncentralized management of computer networks.
    基于智能IC卡的公共钥加密与签名方法为实现非集中管理提供安全可靠的解决方法。
  15. It is essential to discover a one-way trap-door function in constructing a public-key encryption ( scheme.)
    构成一种公钥加密方案的关键是找到一个带陷门的单向函数。
  16. In order to store and transmit digital images in safety, we presented a kind of public-key encryption algorithm based on knapsack problem for digital image encryption.
    为了实现数字图像的安全存储和传输,本文提出了一种基于背包问题的数字图像公开密钥加密算法。
  17. Public-key Encryption Based on Torus Automorphisms
    基于环面自同构的公钥加密算法
  18. The embedment of the text proclaimed in writing in elliptical public-key encryption system is studied theoretically and a general algorithm is designed.
    对椭圆公钥密码体制中的明文嵌入进行了理论研究,设计了一个通用的算法。
  19. Improvement in Public-key Encryption and Key Exchange Scheme Based on Chebyshev Polynomials
    基于Chebyshev多项式的公钥加密和密钥交换方案的改进
  20. In this paper we describe a cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem.
    论文描述了一种基于多项式还原问题的公钥加密方案的密码分析。
  21. It uses public-key encryption algorithms for authentication and private-key for data encryption.
    对此,文章提出了基于恢复的多重防护解决方案,并使用公钥加密算法鉴权,使用私钥对通信数据进行加密。
  22. Computational speed of public-key encryption is relatively much slower.
    相对对称加密来讲,公开密钥加密计算速度非常慢。
  23. There are two ways to encrypt the data: Symmetric Algorithm Encryption, Public-key Algorithm Encryption.
    对数据的加密可以有两种方法:对称密钥加密机制和非对称密钥加密机制。
  24. KD-SNFS combines the symmetric-key encryption algorithm and the public-key encryption algorithm to ensure the security of files.
    KD-SNFS综合使用了对称密钥加密算法和公钥加密算法来提供安全性。
  25. Now the public-key encryption is the main method to protect the information security features, which is based on the arithmetical theory.
    目前保证这些信息安全特性的主要手段,是利用基于数论理论的公钥加密机制和技术实现。
  26. An efficient SEM-based certificateless public-key encryption scheme using bilinear pairing is proposed. The proposed scheme can eliminate the key escrow problem in traditional identity-based public-key cryptosystem, and also realize the immediate revocation of user keys. 3.
    利用双线性对构造了一个有效的基于安全中介的无证书公钥加密方案,消除了传统的基于身份的密钥体制中存在的密钥托管问题,并实现了用户密钥的快速撤销。
  27. Although modern cryptography provides symmetric-key block ciphers, public-key encryption, digital signature and key exchange technology to guarantee the information safety, all those algorithms 'safety only relies on a small scale key.
    虽然现代密码学中的对称密码体制、公钥密码体制、数字签名和密钥交换技术起到了保障安全的作用,但这些算法都将数据的安全性简单的归于一个规模很小的单一密钥。
  28. An approach is proposed to efficiently simulate exponentiation operation using iteration of S-Box, and then to implement the key agreement, public-key encryption and digital signature based on discrete logarithm problem.
    提出利用迭代S盒模拟指数运算,从而模拟基于离散对数问题的密钥协商,公钥加密和数字签字。
  29. In the area of fast public-key cryptography, the author obtains the following main results. ( 1) A new kind of easy knapsack-type problems is found. A knapsack-type public-key encryption scheme is constructed based on the problem.
    在快速公钥密码这一研究领域,本文取得了如下成果:(1)找到了一类新的易解背包问题,并用此问题构造了一个背包型加密算法。
  30. The relative public-key encryption, key exchange, authentication identity and digital signal schemes are presented.
    先后提出了基于扩展的Chebyshev多项式的公钥加密、密钥交换协议、网络身份认证协议以及数字签名协议。