网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Cryptosystem
例句
1. In general, any new cryptosystem could harbor serious flaws that are discovered only after years of scrutiny by cryptographers.
2. Research on the Cryptosystem Related to Secret Key Security.
3. A cryptosystem based on recombinant DNA technique is presented.
3. is a online sentence dictionary, on which you can find good sentences for a large number of words.
4. The Public-Key Cryptosystem is an important branch of Cryptosystem.
5. That breaking the new cryptosystem is equivalent to factoring a general large integer have been showed. A new digital signature scheme and a new authentic encryption scheme have been designed.
6. RSA cryptosystem, a public-key cryptosystem that being used widely today, seems to have difficulty to meet the user's need of higher security.
7. Another popular secret - key cryptosystem is the International Data Encryption Algorithm ( IDEA ).
8. Elliptic Curve Cryptosystem(ECC) is a kind of public-key cryptosystem based on algebraic curve.
9. In this paper we discuss one cryptosystem which based on the theory of the finite automaton.
10. RSA is the most widely used public-key cryptosystem in the world.
11. Knapsack public-key cryptosystem is characterized by fast encryption and decryption.
12. The RSA public-key cryptosystem is one of the widely used public-key cryptosystems.
13. Elliptic curve public-key cryptosystem(ECC)'s security is based on the intractability of the elliptic curve discrete logarithm problem.
14. A public-key cryptosystem based on error correcting codes is presented. This public-key cryptosystem can perform signature, encrypting, error detecting and error correcting simultaneously.
15. In the absence of mathematical proofs of security, nothing builds confidence in a cryptosystem like sustained attempts to crack it.
16. It is very important to investigate the decomposition of weakly invertible finite automata, since it could provide an approach to cryptanalyzing finite automata public-key cryptosystem(FAPKC).
17. This paper proposes a short designated verifier signature scheme based on self - certified cryptosystem.
18. Based on the security of the discrete logarithmic problem, the RSA public-key cryptosystem and the one-way function, proposed a new security enhanced method of a threshold proxy signature scheme.
19. Maxim No. 2: Only a cryptanalyst, if anybody, can judge the security of a cryptosystem.
20. Compared with M public-key system and some variants, the performance of the public - key cryptosystem was analyzed.
21. Studies scalar multiplication algorithms to speed up the elliptic curve cryptosystem.
22. This is perhaps a trivial example, but analysis of the type I have just described can be the thin end of the wedge in penetrating a cryptosystem.
23. The RSA function is one-way function, promising RSA public-key cryptosystem the safety thus.
24. Usually modular inverse operation becomes bottlenecked in realizing the public key cryptosystem.
25. And it works together with a new hardware chip to get a elliptic curve public-key cryptosystem.
26. Only a cryptanalyst , if anybody, can judge the security of a cryptosystem.
27. In this paper, we propose a new digital watermarking algorithm based on quadratic knapsack problem, which belongs to public-key cryptosystem.
28. According to matrix character display communication technology, we suggested a new cryptosystem.
29. This paper gives a solution by using Elliptic Curve Cryptosystem ( ECC ) as the public key scheme.
30. Because the new algorithm extends the state component of the automata, which makes constructing automata more complex, the security will be improved and it's harder to break into this cryptosystem.
31. Implement a digital signature scheme based on elliptic curve cryptosystem.
32. Elliptic curve cryptosystem is a kind of public-key cryptosystem based on algebra curve.
33. This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which uses only one private key.
34. Security; Key Management; Threshold Signature; Elliptic Curve Cryptosystem ; Ad Hoc network.
35. Another popular secret - key cryptosystem is International Data Encryption Algorithm ( IDEA ).
36. The RSA cryptosystem, which is a public-key cryptosystem being used widely nowadays, seems to have difficulties to meet the users' need of higher security.
37. It is proved that this public key cryptosystem based on compound encryption has not been influenced on time complexity and space complexity, but it has more security t.
38. This paper presents a public-key cryptosystem based on intractable for solving high order equation and intractable for factoring large number.
39. As a new branch of public-key cryptosystem, digital signature is a key technology of the secure B2B (Business to Business) and government affair in recent years.
40. The concept of composition of finite automata is first proposed in finite automaton public key cryptosystem.
41. This paper uses Elliptic Curve Cryptographs Cryptosystem as the public key cryptosystem.
42. These two types of public-key cryptosystem their advantages and disadvantages.
43. A fast public-key cryptosystem is proposed to remedy this drawback.
44. Divisor scalar multiplication is the key operation in hyperelliptic curve cryptosystem.
45. By studying and improving on ECC mainly, this article deals with the design and encryption algorithm implementation of a hybrid cryptosystem based on elliptic curve.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2025/2/1 1:38:53