您要查找的是不是:
- Defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest. 定义加加密算法是对称的、非对称的还是消息摘要。
- We recommend using your favorite public key cryptography algorithm for digital signatures. 我们推荐您将自己喜欢的公钥密码学演算法用于数位签章。
- RSA cryptography algorithm is an important algorithm, the procedure of the algorithm is a complete implementation process. RSA算法是密码学中一个重要算法,该程序给出了该算法的完整实现过程。
- The result proves that the proposal of using ECDH in EGH.2 is correct, we can see the advantage of using ECC compared to others public cryptography algorithm in Ad Hoc environment. 在试验用Ad Hoc网络环境中对基于DH算法和ECDH算法的EGH.;2协议分别做了对比测试,给出了密钥长度和生成时间的测试结果,验证改进协议对于网络动态拓扑的适应性。
- It's hard to get a cryptographic algorithm published. 发表一个密码学算法是很困难的。
- It supports a large number of cryptography algorithms and provides an implementation for JCE 1.2.1. 它支持大量的密码术算法;并提供JCE 1.;2
- This article discusses the basic principle of present data encryption algorithm:DES algorithm and Rijndael algorithm of AES, and makes a comparison of symmetric cryptography algorithms, then analyzes the symmetric cryptography algorithms of DES and AES. 讨论了目前主要的一些数据加密算法、DES算法及高级加密标准(AES)的Rijndael算法。
- Public-Key Cryptography Algorithm 公钥密码体制
- Modular exponentiation of larger-number has universal application in cryptography,and it is the base operation in most public-key cryptography algorithms. 大数模幂在密码学领域有广泛的应用,它是公钥密码的基础。
- B-Crypt A symmetric cryptographic algorithm designed by British Telecom. 英国电信公司提出的对称密码算法。
- Modular multiplication of larger-number has universal application in cryptography, and it is the base operation in most public-key cryptography algorithms such as RSA,ElGamal, Fiat- Shamir. 大数模乘在密码学领域有广泛的应用,它是实现RSA、ElGamal、Fiat-Shamir等公钥密码算法的基本运算。
- Public-Key Cryptography is used for strong authentication, but X.509 is not dependent on the use of a particular cryptographic Algorithm, though two users wishing to authenticate must support the same Algorithm. 强认证使用公钥加密方式,但是X.;509并不依赖于使用特殊加密算法,尽管两个用户希望认证必须支持同一算法。
- Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm. 描述如何将算法名称映射到加密类以及如何将对象标识符映射到加密算法。
- The interfering signal is produced by cryptographic algorithm, with good restoration resistance. 干扰信号由密码算法产生,具有良好的抗还原性能。
- First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized. 综述了RSA密码算法中模幂运算的主要攻击方法及其防御措施。
- So, the design of the platform is of great meaning and effect in the research and design of cryptographic algorithm. 因此,该平台的研制对研究和设计密码算法具有十分重要的意义和作用。
- Provide the realization scheme of the simulated distributive and parallelized cryptographic algorithm. 给出模拟的分布式、并行化密码算法实现方案。
- public key cryptography algorithms 公钥密码算法
- symmetric cryptography algorithms 对称密码体制
- The jamming signal is produced by cryptographic algorithm, with good restoration resistance. 干扰信号由算法产生,具有良好的抗还原性能。