| 1. | Archaeological studies of chinese music and military cryptograph 中国乐曲考古学与军事密码学的比较 |
| 2. | Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph 针对这些存在的问题,笔者提出了一种改进方案? ? bb84 +量子密钥分配方案。 |
| 3. | The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers 从一个公开密钥和密文中恢复出明文的难度等价于分解两个大素数之积。 |
| 4. | Cryptology is the core of the information security . modern cryptograph divides into the public key system and the private key system 密码学是信息安全技术的核心,现代密码体制分为公钥体制和私钥体制两大类。 |
| 5. | In this paper , the security of the wtls is analysed . now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack 椭圆曲线法和ripemd ? 160是两种目前较新的加密算法,且不易被破解,本文初步分析和研究了这两种方法。 |
| 6. | Last we describe the functions of the system in brief in the sixth chapter , we introduce the cryptograph protocol and the sollltion of some typical cryptosystems 第六章介绍了密码协议与典型密码系统的实现方案。说明了密码协议及其在安全系统中的应用,并分析了目前广泛应用的典型密码系统实现方案。 |
| 7. | This thesis mainly analyses security in the wtls and reasons for defects , study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm 本文主要分析了wtls的安全漏洞及其存在的原因,并在此基础上研究了两种解决wtls安全问题的方法? ?椭圆曲线和ripemd ? 160算法。 |
| 8. | The paper introduces a sort of encrypted algorithm which comparied with the original length of cryptograph , the length of encrypted cryptograph will base on the difference of the encrypted information piece length to minish 本文介绍了一种加密后的密文长度与原明文长度文相比,依据所选加密信息块长度的不同而做相应减小的加密算法。 |
| 9. | Public key cryptography , combined with the traditional symmetric cryptograph and the message digest technology , can provide confidentiality , integrity and proof of origin . it ' s the foundation of many secure applications 公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。 |