您要查找的是不是:
- personal key algorithm 私钥加密算法
- Computers encrypt data by applying an algorithm to a Block of data. A personal key known only to the message's transmitter and intended receiver is used to control the encryption. 计算机使用某种算法对资料进行加密,只有转译讯息和预定接收的人才知道密钥。
- A secret key algorithm that processes a stream of bits one bit at a time. 一次处理位流中一位的秘钥算法。
- Symmetric Key algorithm uses the same key to encrypt and decrypt the data. 对称密钥是加密和解密都使用的一个密钥.
- When you apply a digital signature to a document, a kind of checksum is computed from the document's content plus your personal key. 当您将数字签名应用于文档时,根据文档的当前内容和你的个人密钥计算一个校验值。校验值和你的公共密钥与文档一起存储。
- The nonsecret half of a cryptographic key pair that is used with a public key algorithm. 与公钥算法一起使用的加密密钥对的非保密部分。
- An unsupported or unknown key algorithm was encountered; the current operation cannot be completed. 遇到了不支持的或未知的密钥算法;当前操作无法完成。
- Furthermore, paper modifies some key algorithm according the digital TV program personalization service character. 本文重点结合传统个性化信息服务系统的关键技术,将这些技术运用到数字电视节目个性化信息服务系统中,并且对一些关键技术结合数字电视节目个性化服务的特点,进行修正。
- In CDMA networks, CAVE algorithm is the key algorithm of authentication, but CAVE is not clear to us because of the protection by ITAR. 摘要由于我国并未掌握蜂窝鉴权与话音加密算法(CAVE)的实现,使得CDMA网络并未实现真正的安全。
- In CDMA networks,CAVE algorithm is the key algorithm of authentication,but CAVE is not clear to us because of the protection by ITAR. 由于我国并未掌握蜂窝鉴权与话音加密算法(CAVE)的实现,使得CDMA网络并未实现真正的安全。
- Though the public key algorithm has great advance, its running speed can not compare with the private key system for it is based on a complicated trapped function. 公钥算法虽然具有很多优点,但由于其是建立在某个复杂的单向函数的基础上,这就必然导致其加、解密速度远不能与私钥算法相提并论。
- The security of public key algorithm is based on mathematic problems, anal the security of symmetric cryptographic algorithm is based on the key length. 公钥密码算法的安全性基于数学上的难题,而设计良好的分组密码算法的安全性依赖于密钥长度。
- In addition, the key algorithm of the classic periodogram spectrum estimation has been improved with split-radix algorithm that can shorten the time of program executing. 另外,采用分裂基算法对经典的周期图谱估计的关键算法进行了改进,可缩短程序运行时间。
- RSA public key algorithm with Java and network transmission of encipherad data are implemented,and on basis of this,an improved solution for electronic wallet in electronic business is also obtained. 用 Java实现了 RSA公开密钥算法及加密数据在网上的传输 ,在此基础上提出了在电子商务中用 Ja-va实现电子钱包的改进方案
- Consequently, symmetric key algorithms are normally used for securing data at rest. 因此,一般采用对称密钥算法来保证静态数据的安全。
- They shun personal fame and gains. 他们不计个人名利。
- The main performance bottleneck, as expected, is the slow public key algorithms. 正如预料的那样,主要的性能瓶颈是公钥算法的速度很慢。
- Every person is accountable for his own work. 每个人都要对自己的工作负责。
- The key management schemes for public key algorithms and symmetric algorithms are introduced respectively. 本文分别介绍了用户公开密钥算法与对称密钥算法的密钥管理方案,针对密钥监管的需要,本文介绍了密钥托管技术。
- That kind of person is anything but a Marxist. 那种人根本不是马克思主义者。