您要查找的是不是:
- It supports a large number of cryptography algorithms and provides an implementation for JCE 1.2.1. 它支持大量的密码术算法;并提供JCE 1.;2
- Defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest. 定义加加密算法是对称的、非对称的还是消息摘要。
- We recommend using your favorite public key cryptography algorithm for digital signatures. 我们推荐您将自己喜欢的公钥密码学演算法用于数位签章。
- Modular exponentiation of larger-number has universal application in cryptography,and it is the base operation in most public-key cryptography algorithms. 大数模幂在密码学领域有广泛的应用,它是公钥密码的基础。
- RSA cryptography algorithm is an important algorithm, the procedure of the algorithm is a complete implementation process. RSA算法是密码学中一个重要算法,该程序给出了该算法的完整实现过程。
- This article discusses the basic principle of present data encryption algorithm:DES algorithm and Rijndael algorithm of AES, and makes a comparison of symmetric cryptography algorithms, then analyzes the symmetric cryptography algorithms of DES and AES. 讨论了目前主要的一些数据加密算法、DES算法及高级加密标准(AES)的Rijndael算法。
- Modular multiplication of larger-number has universal application in cryptography, and it is the base operation in most public-key cryptography algorithms such as RSA,ElGamal, Fiat- Shamir. 大数模乘在密码学领域有广泛的应用,它是实现RSA、ElGamal、Fiat-Shamir等公钥密码算法的基本运算。
- The result proves that the proposal of using ECDH in EGH.2 is correct, we can see the advantage of using ECC compared to others public cryptography algorithm in Ad Hoc environment. 在试验用Ad Hoc网络环境中对基于DH算法和ECDH算法的EGH.;2协议分别做了对比测试,给出了密钥长度和生成时间的测试结果,验证改进协议对于网络动态拓扑的适应性。
- It's hard to get a cryptographic algorithm published. 发表一个密码学算法是很困难的。
- public key cryptography algorithms 公钥密码算法
- symmetric cryptography algorithms 对称密码体制
- Public-Key Cryptography Algorithm 公钥密码体制
- B-Crypt A symmetric cryptographic algorithm designed by British Telecom. 英国电信公司提出的对称密码算法。
- Mapping Object Identifiers to Cryptography Algorithms 将对象标识符映射到加密算法
- Public-Key Cryptography is used for strong authentication, but X.509 is not dependent on the use of a particular cryptographic Algorithm, though two users wishing to authenticate must support the same Algorithm. 强认证使用公钥加密方式,但是X.;509并不依赖于使用特殊加密算法,尽管两个用户希望认证必须支持同一算法。
- Each CSP contains the implementation of a specific set of cryptographic algorithms. 每个CSP包含特定一组加密算法的实现。
- The performance of VPN is related to cryptographic algorithms, authentication algorithms and network environments. VPN的性能与加密算法、认证算法和网络环境有关。
- It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols. 密码技术主要包括对称密码算法和非对称密码算法及协议。
- Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm. 描述如何将算法名称映射到加密类以及如何将对象标识符映射到加密算法。
- Public-key cryptographic algorithms use a fixed buffer size whereas secret-key cryptographic algorithms use a variable-length buffer. 公钥加密算法使用固定的缓冲区大小,而私钥加密算法使用长度可变的缓冲区。