您要查找的是不是:
- quantum cryptography algorithm 量子密码算法
- Trojan horse attacking strategy on quantum cryptography is investigated. 研究了特洛伊木马对量子密码算法的攻击.
- For the practical and commercial use of quantum cryptography, we need to distribute keys among many users. 量子密码术要走向实用化,必须实现多用户间的量子密钥分配。
- Unlike public-key cryptography, quantum cryptography should remain secure when quantum computers arrive on the scene. 量子密码术和公开金钥加密法的差别在于,前者在量子电脑出现后仍然牢不可破。
- The other branch is quantum cryptography, which promises unbreakable codes for messages. 另一个扩展方向是量子密码学,用于为信息制作无法破解的密码。
- The other two companies developing quantum cryptography for commercial use, MagiQ and BBN Technologies, are American. 而正尝试将这一技术市场化的还有两家公司,MagiQ和BBN科技,都是美国的。
- Quantum cryptography is the combination between classic cryptography and the principle of quantum mechanics,and its security can be proved. 量子密码学是量子力学原理和经典密码学相结合的产物,具有可证明的安全性。
- Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect secrecy. 因为一次插入被理论上证明是不被破译的,量密码术是完全保密的答案。
- Defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest. 定义加加密算法是对称的、非对称的还是消息摘要。
- Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe. 摘要量子密码被证明是绝对安全的,其核心技术是量子密钥分配(QKD)。
- In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack. 另外,量子保密可以新的方法保护信息,从而避免经典攻击下的信息窃取。
- We recommend using your favorite public key cryptography algorithm for digital signatures. 我们推荐您将自己喜欢的公钥密码学演算法用于数位签章。
- Such a photon counter is essential if quantum cryptography is to work, because it will allow what are known as quantum repeaters to be built. 假如要让量子密码学学以致用,这样的光子计算器至关重要,因为后者为量子中继器的建立提供支持。
- Quantum cryptography,which is based on fundamental physical principles,has been proved to be an effective technique fo r secure key distribution. 基于量子物理原理的量子密码术已被证明是保密信中密钥安全分配的有效手段。
- The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world. 量子密码术的不可侵犯性,是建立在真实世界里不见得成立的一组假设上。
- RSA cryptography algorithm is an important algorithm, the procedure of the algorithm is a complete implementation process. RSA算法是密码学中一个重要算法,该程序给出了该算法的完整实现过程。
- Quantum cryptography is best known for key distribution.However, previous proposed proofs of security of Quantum Key Distribution (QKD) contain various technical subtleties. 量子密码学因密钥分配而众所周知,然而早先提出的量子密钥分配的安全证据包含许多技术困难。
- For example, one could perform quantum cryptography with an entangled photon pair or an entangled pair of atomic nuclei or even a photon and a nucleus entangled together. 例如,我们可以用一对缠结光子,也可以用一对缠结原子核,甚至是缠结在一起的一个光子与一个原子核,来执行量子密码学的工作。
- The quantum cryptography and BB84 protocol are introduced.Their security is analyzed.An example to explain the process of quantum transmission is given. 介绍了量子加密以及BB84协议,对其安全性进行了分析,并给出例子详述量子密钥的传送过程。
- It's hard to get a cryptographic algorithm published. 发表一个密码学算法是很困难的。