| 1. | Part 3 : asymmetric cryptography 第3部分:非对称密码术 |
| 2. | Other asymmetric cryptosystems 其它非对称密码系统 |
| 3. | Examples of asymmetric ciphers 非对称密码的示例 |
| 4. | A widely - used asymmetric cryptosystem based on a factoring problem 一种基于因式分解问题的广泛使用的非对称密码系统。 |
| 5. | Key pair in asymmetric cryptography , the public and private keys together . key recovery 在非对称密码术中,公钥和私钥组合在一起成为密钥对。 |
| 6. | Public - private key combination is at the heart of public key infrastructure , and is based on asymmetric cypher 公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。 |
| 7. | It is generated by the transformation of the electronic record using asymmetric cryptography and a hash function 而该签署是用非对称密码技术及杂凑函数,将该电子记录作数据变换而产生。 |
| 8. | The most talked about algorithm in asymmetric cyphers is rsa , which uses 2048 - bit keys - equivalent to 128 - bit symmetric keys 非对称密码中最常说的rsa使用2048位密钥,相当于128位的对称密钥。 |
| 9. | The public key cryptosystem or the asymmetric cryptosystem is an important way to implement and ensure information security 公开钥密码系统或非对称密码系统是实现和保障信息安全的一种重要方式。 |
| 10. | Public key cryptography is also known as asymmetric cryptography , which is different from symmetric cryptography described in last month s column 公钥密码术也称为非对称密码术,它不同于在上个月的专栏文章中所讲的对称密码术。 |