单词 | Public-key |
例句 | (1) A public-key user needs to obtain and validate a certificate containing the required public key. (2) Clearly, one advantage of public-key cryptography is that no one can figure out the private key from the corresponding public key. (3) Furthermore, public-key cryptography can be used for sender authentication, known as digital signatures. (4) Public-Key Cryptography A more powerful form of cryptography involves the use of public keys. (5) The Public-Key Cryptosystem is an important branch of Cryptosystem. (6) Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption. (7) It uses public-key encryption algorithms for authentication and private-key for data encryption. This solution can provide reliable system security and avoid the deny of service of users. (8) RSA cryptosystem, a public-key cryptosystem that being used widely today, seems to have difficulty to meet the user's need of higher security. (9) Combining advantages of the RSA public-key encryption and pseudorandom generator technology, a privacy preserving distributed mining algorithm of association rules, PPD-ARBSM is proposed. (10) Elliptic Curve Cryptosystem(ECC) is a kind of public-key cryptosystem based on algebraic curve. (11) In a public-key system, for instance, if Zooey wants to send Franny an encrypted message, Franny would first send Zooey her public Key. (12) RSA is the most influential public-key encryption algorithm, it can resist all known password attack so far, has been recommended for ISO public key data encryption standard. (13) With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key. (14) The paper gives a brief introduction to RSA public-key system. (15) Using public-key algorithms, digital certificates, and other related cryptography technologies, PKI could provide a secure platform for network applications above a insecure network environment. (16) RSA is the most widely used public-key cryptosystem in the world. (17) Public-key encryption makes it possible to purchase things online without sending sensitive information such as credit-card numbers openly on the Internet. (18) Knapsack public-key cryptosystem is characterized by fast encryption and decryption. (19) The RSA public-key cryptosystem is one of the widely used public-key cryptosystems. (20) Compared with M public-key system and some variants, the performance of the public - key cryptosystem was analyzed. (21) Kerberos may be adequate for those who do not need the more robust functions and properties of public-key systems. (22) BOINC protects against several types of attacks. For example, digital signatures based on public-key encryption protect against the distribution of viruses. (23) It is very important to investigate the decomposition of weakly invertible finite automata, since it could provide an approach to cryptanalyzing finite automata public-key cryptosystem(FAPKC). (24) In this paper we describe a cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. (25) Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack. (26) The user's public key and private key were calculated by combined public key technology that use a public key and private key factor matrix. It is a new kind of public-key system. (27) Based on the security of the discrete logarithmic problem, the RSA public-key cryptosystem and the one-way function, proposed a new security enhanced method of a threshold proxy signature scheme. (28) Anonymity key - privacy as well as data - privacy are all important features public-key encryption applications. (29) It is essential to discover a one-way trap-door function in constructing a public-key encryption(scheme. (30) Using the theorem of linear Diophantine equations and the Chinese remainder theorem, we have constructed a class of trap-door knapsack public-key cryptosystems, which have a better security. (31) Elliptic curve public-key cryptosystem(ECC)'s security is based on the intractability of the elliptic curve discrete logarithm problem. (32) The RSA function is one-way function, promising RSA public-key cryptosystem the safety thus. (33) And it works together with a new hardware chip to get a elliptic curve public-key cryptosystem. (34) A public-key cryptosystem based on error correcting codes is presented. This public-key cryptosystem can perform signature, encrypting, error detecting and error correcting simultaneously. (35) In this paper, we propose a new digital watermarking algorithm based on quadratic knapsack problem, which belongs to public-key cryptosystem. (36) One disadvantage of public-key system is that they are slower than secret-key systems. (37) Public-key encryption The key distribution problem has always been the weak link in the secret-key systems. (38) Public-key cryptography is one of the most important research direction of encryption, using mathematical function to construct public-key encrypt arithmetic is the nucleus of it. (39) KD-SNFS combines the symmetric-key encryption algorithm and the public-key encryption algorithm to ensure the security of files. (40) Elliptic curve cryptosystem is a kind of public-key cryptosystem based on algebra curve. (41) Through the cryptanalysis of a threshold proxy signature scheme based on bilinear pairings, it was found that the scheme couldn't resist forgery attack and public-key substitute attack. (42) A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download). (43) public-key encryption The key distribution problem has always been the weak link in the secret - key systems. (44) This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which uses only one private key. (45) In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired. (46) Users of public-key encryption have a private key and a public key, and they share their public keys with other users. (47) The paper has an introduction to public-key encryption and the technology of the digital signature, with the emphasis on the one to one secure communication and signing of many people. (48) The RSA cryptosystem, which is a public-key cryptosystem being used widely nowadays, seems to have difficulties to meet the users' need of higher security. (48) Wish you can benefit from our online sentence dictionary and make progress day by day! (49) This paper presents a public-key cryptosystem based on intractable for solving high order equation and intractable for factoring large number. (50) Party A dedicated key can only be decrypted by its public-key encryption of any information. (51) As a new branch of public-key cryptosystem, digital signature is a key technology of the secure B2B (Business to Business) and government affair in recent years. (52) Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys. (53) As a major public-key cryptographic algorithm, RSA cryptographic algorithm occupies an important position in the operator's authentication of electricity market operation system. (54) See Resources for links to more information on digital certificates and public-key encryption in general. (55) Public-key cryptography is one of the most important research field of encryption, using mathematical function to construct public-key encrypt arithmetic is the nucleus of it. (56) It is essential for a public-key encryption scheme to discover a one-way trap-door function. (57) These two types of public-key cryptosystem their advantages and disadvantages. (58) A fast public-key cryptosystem is proposed to remedy this drawback. (59) An area efficient modular arithmetic processor was developed that is capable of performing RSA public-key cryptography and other modular arithmetic operations as a coprocessor. (60) The public-key system uses a pair of mathematically related sequences, one for encryption and the other for decryption. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。