您要查找的是不是:
- It's hard to get a cryptographic algorithm published. 发表一个密码学算法是很困难的。
- B-Crypt A symmetric cryptographic algorithm designed by British Telecom. 英国电信公司提出的对称密码算法。
- Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm. 描述如何将算法名称映射到加密类以及如何将对象标识符映射到加密算法。
- The interfering signal is produced by cryptographic algorithm, with good restoration resistance. 干扰信号由密码算法产生,具有良好的抗还原性能。
- First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized. 综述了RSA密码算法中模幂运算的主要攻击方法及其防御措施。
- So, the design of the platform is of great meaning and effect in the research and design of cryptographic algorithm. 因此,该平台的研制对研究和设计密码算法具有十分重要的意义和作用。
- Provide the realization scheme of the simulated distributive and parallelized cryptographic algorithm. 给出模拟的分布式、并行化密码算法实现方案。
- The jamming signal is produced by cryptographic algorithm, with good restoration resistance. 干扰信号由算法产生,具有良好的抗还原性能。
- A security service is some type of data protection, and is independent of the mechanism or cryptographic algorithm by which it is implemented. 安全服务是某种类型的数据保护,独立于实现服务的机制或加密算法。
- This project includes research of hardware design, research of system software design and research of implementation of cryptographic algorithm. 该课题包括硬件设计研究、系统软件设计研究和算法实现技术研究三个方面的内容。
- The security of public key algorithm is based on mathematic problems, anal the security of symmetric cryptographic algorithm is based on the key length. 公钥密码算法的安全性基于数学上的难题,而设计良好的分组密码算法的安全性依赖于密钥长度。
- In October 2000 Rijndael cryptographic algorithm was selected as AES(Advanced Encryption Standard) by NIST(National Institute of Standards and Technology). 2000年10月,Rijndael加密算法被 美国国家标准技术研究所(NIST)选为新的加密标准(AES)。
- In this paper we will take a close look at four most important modes in cryptographic algorithm:Elec- tronic Code Book mode(ECB),Cipher Block Chaining mode(CBC),Cipher Feedback mode(CFB)and Output Feed- back mode(OFB). 论文对四种最主要的加密算法模式,即电子编码本模式(Electronic Code Book,ECB)、密码分组链接模式(Cipher Block Chaining,CBC)、密码反馈模式(Cipher Feedback,CFB)和输出反馈模式(Output Feedback,OFB)进行了讨论。
- Each CSP contains the implementation of a specific set of cryptographic algorithms. 每个CSP包含特定一组加密算法的实现。
- The performance of VPN is related to cryptographic algorithms, authentication algorithms and network environments. VPN的性能与加密算法、认证算法和网络环境有关。
- It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols. 密码技术主要包括对称密码算法和非对称密码算法及协议。
- Public-key cryptographic algorithms use a fixed buffer size whereas secret-key cryptographic algorithms use a variable-length buffer. 公钥加密算法使用固定的缓冲区大小,而私钥加密算法使用长度可变的缓冲区。
- You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application. 可以使用此方法确定选定的加密算法和强度是否满足您的应用程序的要求。
- Again, let us remind you that using proprietary cryptographic algorithms, including hash functions, is usually a bad idea. 再次提醒您,使用专用密码演算法,包括杂凑函数,通常是一个坏主意。
- After extensizing such modules as PCMCIA driver, Kernel cryptographic algorithms and dynamic key management, I finally implemented 802.11i. 在扩充PCMCIA无线网卡驱动、内核加密和动态密钥管理等模块以后,基本能实现802.;11i。