| 1. | Strategic cipher system 战略密码体制 |
| 2. | Tactical cipher system 战术密码体制 |
| 3. | On the other hand , the cipher systems can be seen as a permutation systems under the controlling of key 另一方面,由于密码系统数学上可以看成是一个在密钥控制下的置换映射。 |
| 4. | After that , an introduction of the relative knowledge of the 802 . 1x , pki and the ellipse cipher system is given 802 . 1x证书认证相关的pki公钥设施基础和椭圆曲线密码体制相关知识。 |
| 5. | The paper finally revolves the secret cipher system , established and realizes one security practical information safe transmission model 论文最后围绕现代密码体制,建立并实现了一个安全实用的信息安全传输模型。 |
| 6. | The results obtained in this thesis offers some new ideas and methods for studying of permutation theory in block cipher system 上述工作为分组密码中置换理论的研究提供了新的方法、新的思路,并得到了一批好的置换源。 |
| 7. | First , this paper discusses popular cipher system and cipher technology to ascertain system running method and encrypting arithmetic 本文首先剖析了目前流行的密码体制和密码技术,以确定本系统的运行方式和加密算法。 |
| 8. | Although some chaotic cipher systems have been attacked , there are still some systems which can not find effective attacking by now 尽管相当数量新提出的混沌密码被攻破了,但是仍有很多直到目前尚未遇到真正有效的攻击。 |
| 9. | This scheme is based on the elliptic curve discrete logarithm , which is one of the mathematic puzzles . compared with other cipher systems , it has shorter length of secret key and grouping in the same security intensity 该体制是建立在椭圆曲线离散对数问题这一数学难题之上的,和其它密码体制相比较而言在同等安全强度下具有小得多的秘钥长度及分组长度。 |
| 10. | Security analyses of a variant of a new block cipher system ( called cac ) based on cellular automata theory are given using two cryptanalytic approaches . the results show that this variant of cac is very insecure under chosen - plaintext attacks 利用两种方法对一个基于细胞自动机的分组密码系统cac的变形进行了分析,结果表明: cac的这种变形在选择明文攻击下是极不安全的。 |