cryptology n.1.隱語。2.密碼學[術]。
n. 1.隱語。 2.密碼學[術]。 “conventional cryptology“ 中文翻譯: 傳統密碼術“journal of cryptology“ 中文翻譯: 密碼學雜志“cryptolucilia caesarion“ 中文翻譯: 綠蠅“cryptologist“ 中文翻譯: 密碼破譯家“cryptomaceral“ 中文翻譯: 隱顯微組分; 隱組分“cryptological“ 中文翻譯: 密碼術的“cryptomagmatic“ 中文翻譯: 隱巖漿的“cryptologic“ 中文翻譯: 密碼的; 密碼邏輯; 密碼術的“cryptomagmatic deposit“ 中文翻譯: 隱巖漿礦床“cryptolithus“ 中文翻譯: 隱三瘤蟲屬; 隱頭蟲“cryptomagmatic mineral deposit“ 中文翻譯: 隱巖漿礦床“cryptolithic“ 中文翻譯: 小洞穴生物
cryptomeria |
|
Combining with cryptology , many experts and scholars , both at home and abroad , present various authentication schemes , among which some are dependent on authority , some have poor security and others are complicate 結合密碼學技術,許多國內外的專家和學者提出了各種認證方案。這些方案,有的要依賴于特權者,有的安全性不強,有的認證過程復雜。 |
|
It ' s also suggested that the research on multimedia data authentication should aim at concrete situation . it ' s undoubtedly that designing the watermark scheme based on watermark and cryptology should be promising 同時指出,將數字水印和現代密碼學有機地結合起來,以之為基礎構造水印方案,將是多媒體認證技術的發展的一個很有前景的方向。 |
|
Quantum cryptology is a new method for secret communications . this new method utilizes the quantum nature of single photons . data can be transferred with a proven security via the protocols of quantum key distribution 量子密碼術是一種實現秘密通信的新方法,它利用單光子的量子性質,借助量子密鑰分配協議可實現數據傳輸的可證性安全。 |
|
Some knowledge of different courses have been used in this design , such as cryptology , electronics , program design etc . so this design is a integration of many techniques and it is valuable to use 設計中涉及到了硬件電路設計、軟件程序開發以及加密算法設計等多學科知識,所設計的加密鎖技術含量高、安全可靠,具有很高的使用價值。 |
|
D . boneh , m . franklin , “ identity - based encryption from the weil pairing , “ advances in cryptology - - crypto ' 2001 , lecture notes on computer science 2139 , springer - verlag ( 2001 ) , pp . 213 - - 229 . full version 然后再在這個網站上找一些看就有數了。當然這個網站最近2年的文章沒有,你可以到各大密碼會議的接受論文中查找。 |
|
Because this is part 2 in a series , you should have completed part 1 . after you complete this tutorial , you can do part 3 in this series : introduction to cryptology concepts : part 1 此外,許多讀者會是程序員和系統分析員,為計劃開發或實現密碼系統和協議(可能恰好將此類職責分配給從本教程受益的人)的雇主服務。 |
|
The thesis introduce the base of network database security , which includes modern cryptology and database security , and introduce principle of fingerprint characteristic in identity identification 本文首先介紹網絡數據庫安全的基礎:即現代密碼學和數據庫安全,接著介紹了指紋特征在身份認證中的原理。 |
|
In proc . advances in cryptology - eurocrypt 1997 , lecture notes in computer science 1233 , konstanz , germany , 1997 , pp . 465 - 479 . 3 chen l , pedersen t p . new group signature schemes 在早期的群簽名方案中,簽名的長度隨著群體成員數目的增加而增加,當群體成員數目較多時,簽名的長度較長,并不適用。 |
|
Advances in cryptology - eurocrypt 1994 , lecture notes in computer science 950 , perugia , italy , 1994 , pp . 171 - 181 . 4 camenisch j , stadler m . efficient group signature schemes for large groups 近年來,一些具有固定簽名長度的群簽名方案,尤其是一些高效的具有較短簽名長度的群簽名方案逐漸被提出。 |
|
This article will discuss the application research of the cryptology algorithm in the model of the secure electronic transaction based on the analysis of the model of the secure electronic transaction 本文在分析了安全電子交易模型的基礎上,討論了密碼算法在安全電子交易模型中的應用問題。 |
|
While elliptic curve cryptography has just emerged as an interesting branch of cryptology since 1985 , which use relatively shorter key in procuring security to the same extent 自80年代中期被引入以來,橢圓曲線密碼體制逐步成為一個十分令人感興趣的密碼學分支, 1997年以來形成了一個研究熱點。 |
|
In cryptology , the art or science that treats of the principles , means and methods for rendering plaintext unintelligible and for converting encrypted messages into intelligible form 密碼學中,將明文轉變為不可能理解的密文和反過來將密文轉變為可理解形式的方法、手段、理論的一門科學或技巧。 |
|
“ the essential difference between this technology and cryptology is that the latter conceals the content of information itself while the former conceals the very existence of information 該技術與密碼技術之不同點在于:密碼技術隱藏信息的“內容” ,而信息隱藏技術則隱藏信息的“存在性” 。 |
|
Synthesizing the current cryptology technique , this article use the safety des and aes which has been international accepted as the private key cryptology , use rsa as the public key cryptology 綜合現有的密碼技術,本文使用國際公認安全的des和aes作為私鑰密碼,使用rsa作為公鑰密碼。 |
|
3 rueppel r a . on the security of schnorr s pseudorandom generator . in advances in cryptology - eurocrypt 89 , lncs 434 , springer - verlag , houthalen , belgium , april 1989 , pp . 423 - 428 Luby和rackoff的主要結果是:如果輪函數是偽隨機函數,則3輪feistel結構是偽隨機的, 4輪feistel是超偽隨機的。 |
|
This tutorial along with the others in this series is for you if you want to familiarize yourself with cryptology , its techniques , its mathematical and conceptual basis , and its lingo 本教程(以及本系列的其它教程)適合于希望熟悉密碼學及其技術、數學和概念基礎以及專門術語的程序員。 |
|
Aiming for the characters of the current cryptology , this paper is combined with the latest developing direction of cryptology and carries on a study on data encryption for network communication 本文針對當前密碼學的自身特點,結合密碼學的最新發展方向,對網絡數據加密進行了研究。 |
|
Implementing various cryptosystems , based on the abel group composed of the points on elliptic curves , has already developed into an extremely important subject in cryptology research 以橢圓曲線上的有理點構成的abel群為背景結構,實現各種密碼體制已是公鑰密碼學領域的一個重要課題。 |
|
In addition , boolean permutation plays an important role in designing cryptology system . a cryptology system without any information expansion can be regarded as a permutation 另外,布爾置換在密碼體制設計中有著重要的應用,任何沒有信息擴張的密碼體制都可以看作是置換的結果。 |