单词 | Ecc |
例句 | 1. Multibit ECC errors were detected on the RAID controller. 2. But building a security fast ECC is complex. 3. The security of ECC is based on the elliptic curve discrete logarithm problem ( ECDLP ). 4. This procedure has ECC Elliptic Curve encryption and decryption algorithm, you would like to help! 5. Elliptic Curve Cryptosystem(ECC) is a kind of public-key cryptosystem based on algebraic curve. 6. So ECC memory is only required in mission - critical workstations and in servers. 7. The rapid implementation of the ECC hardware has been a popular topic. 8. RSA and ECC perhaps are the main public - key algorithms. 9. Elliptic curve cryptography ( ECC ) is an important subject in the field of public key cryptography. 10. The following are requests for comparisons of RSA ECC cryptography. 11. Memory errors that may include parity or Error Correction Code (ECC) problems. 12. Elliptic curve public-key cryptosystem(ECC)'s security is based on the intractability of the elliptic curve discrete logarithm problem. 13. The pathogen of Amorphophallus soft rot disease is Erwinia carotovora subsp carotovora (Ecc). 14. The ECC and classical public key cryptogram system are compared. 15. A sector includes user data and overhead data, such as an Error Correction Code (ECC) that has been calculated from the user data of the sector. 16. Elliptic Curve Cryptography ( ECC ) standard complete source code, has been tested. 17. Uncorrectable Data: An ECC error in the data field could not be corrected (a media error or read instability). 18. Additionally, EMC EFDs safeguard data with full round-trip error correcting code (ECC) data integrity protection and destage power backup. 19. Ecc growsmost rapidly at 26℃, Eca at 21℃, while growth of Ech was similar in 3 temperatures. 19. is a online sentence dictionary, on which you can find good sentences for a large number of words. 20. The ECC controller transmits the data to a direct memory access (DMA) buffer for transfer to the host device, and to an ECC block for error detection and correction of the data. 21. The Polynomial - Basis Multiplier in the finite field is the key module to realizing ECC basic operations. 22. This paper proposes a novel group key agreement protocol MTKA - ECC based on a multi tier structure. 23. An arithmetic unit, which can perform all dual Galois fields' arithmetic operations, including addition, subtraction, multiplication, squaring, inversion and division, is designed for the ECC. 24. A New Broadcasting Multi - Digital Signature Scheme based on ECC is presented. 25. You can detect the presence of back blocks from a failed flash operation (such as an Erase) or an invalid Write operation (discovered through an invalid Error Correction Code, or ECC). 26. Elliptic Curve Cryptography (ECC) is a rather complicated algorithm. It is difficult to design an application specific integrated circuit (ASIC) to fully implement ECC. 27. Moreover, because the HECC based on smaller base field may have the same strength with ECC, it will have large application prospect in embedded systems. 28. Cardiotomy suction negative pressure was determined by vacuo meter during ECC. 29. The major work of this paper is the research of ECC over GF ( 2~ m ). 30. This paper gives a solution by using Elliptic Curve Cryptosystem ( ECC ) as the public key scheme. 31. Introduce the ECC(Error Correction Code) into the field of information hiding in binary images. 32. Introduced the concept of edge clustering coefficient (ECC) to community structure discovery of simple graph and proposed an algorithm of community discovery based on ECC. 33. The ECC algorithms are configured to detect and perfectly correct errors in the data. 34. As it is shown , TYJL _ — ECC fault - tolerant computer interlocking control system features high reliability and safety. 35. ECC is one of the known public crypto Methods : That provide the best strength - per - bit. 36. They can be widely used in garments , sportswear, footwear, bags, home furniture, velcro, sand chair, ecc. 37. Introduced DES, AES, and IDEA encryption algorithm, RSA, and ECC encryption algorithm, finally, produced the mix crypto-algorithm design proposal. 38. But actualizing ECC arithmetic in smart card which has finite computation ability and memorizer space also exists lots of questions to resolve. 39. Experiment shows that by adding CIRC ECC (error correcting circuit), the BER (bit error rate) can be decreased from 10 -3 to less that 10 -8 . Finally, the reason for error is analysed. 40. In accordance with the definitions of block image element and mixed image element with ECC, a block image element encryption algorithm based on ECC is proposed in this paper. 41. Based on the analysis of the basic algorithms for the ECC, the computer algebraic model and the software architecture are established, thus lay a solid foundation for the algorithm optimization. 42. This paper proposes a fast SSL handshake protocol with cache based on Elliptic Curve Cryptosystems ( ECC ) . 43. By studying and improving on ECC mainly, this article deals with the design and encryption algorithm implementation of a hybrid cryptosystem based on elliptic curve. 44. The process of ECC includes the selection of base field and coordinates, scalar multiplication and field operation. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。