| 1. | An improved attack algorithm for discrete logarithm problem 一个改进的离散对数问题攻击算法 |
| 2. | Blind proxy signature mending scheme based on discete logarithm 对基于离散对数的代理盲签名方案的改进 |
| 3. | The set of participants to perform key agreement should satisfy threshold 该方案使得参与者可以协商秘密密钥,而不用基于离散对数假设。 |
| 4. | The security of elliptic curve cryptogrphy ( ecc ) is based on the difficulty of elliptic curve discrete logarithm 椭圆曲线密码体制的安全性基于椭圆曲线离散对数问题的难解性。 |
| 5. | Public key cryptography for the financial services : agreement of symmetric keys using discrete logarithm cryptography 金融业务的公开密钥加密:使用离散对数密码术的对称密码协议 |
| 6. | The security of the elliptic curve cryptography is built upon the difficulty of solving the elliptic curve discrete problem 椭圆曲线密码系统的安全性建立在椭圆曲线离散对数问题的难解性上。 |
| 7. | Ecc is set up on the basis of solving this mathematics difficult problem of the elliptic curve discrete logarithm problem ( ecdlp ) 椭圆曲线密码体制( ecc )建立在解椭圆曲线离散对数问题( ecdlp )这一数学难题的基础上。 |
| 8. | Information technology - security techniques - digital signature schemes giving message recovery - part 3 : discrete logarithm based mechanisms 信息技术.安全技术.带消息恢复功能的数字签名方案.第3部分:基于离散对数机制 |
| 9. | The second approach is to use the concept of discrete logarithm . understanding this concept requires understanding some properties of multiplicative groups 第二种方法就是运用离散对数的概念。要掌握这些概念首先需要了解乘法群的概念。 |
| 10. | Research on the security of the elliptic curve discrete logarithm problem , present the conditions of keeping the security of the elliptic curve discrete logarithm problem 对椭圆曲线离散对数问题进行了研究。建立了一种便于实现的,安全的椭圆曲线密码体制。 |