| 1. | Digital signatures rely on public key cryptography 数字签名依赖于公共密钥加密学。 |
| 2. | The primary disadvantage of public key cryptography is speed 公共密钥加密的主要缺点是速度。 |
| 3. | Public key cryptography for the financial services industry : certificate management 金融服务业用公共密钥加密.证书管理 |
| 4. | Sha - 1 public key cryptography for the financial services industry - part 2 : the secure hash algorithm 金融服务业用公共密钥加密.第2部分:安全散列算式 |
| 5. | Public key cryptography for the financial services industry : extensions to public key certificates and certificate revocation lists 金融服务业用公共密钥加密:公共密钥证书和证书撤回列表的扩展 |
| 6. | We identify two categories of operations in symmetric - key and public - key cryptographic algorithms that are not common in previous general - purpose workloads : advanced bit operations within a word and multi - word operations 我们区别对称密钥和公共密钥加密算法中的两类运算:面向位的运算和多字运算,他们在以往通用负载中并不常见。 |
| 7. | In public key cryptography , also known as asymmetric key cryptography , the process of encryption and decryption involves two keys : a " public " key used to encrypt data and a " private " key used to decrypt data 在公共密钥加密,也称非对称密钥加密中,加密和解密过程要用到两个密钥:一个用于加密数据的“公( public ) ”钥和一个用于解密数据的“私”钥。 |