| 1. | Public - key encryption asymmetric cryptography 公钥加密(不对称加密) |
| 2. | A new public - key encryption scheme 一种新的公钥加密方案 |
| 3. | Two parties alice and bob might use public - key encryption as follows 双方(小红和小明)可以按照下列方式使用公钥加密。 |
| 4. | Public - key encryption 公钥加密 |
| 5. | For more information , see the section on public - key encryption , later in this topic 有关更多信息,请参见本主题后面的有关公钥加密的部分。 |
| 6. | The . net framework provides the following classes that implement public - key encryption algorithms . net framework提供以下实现公钥加密算法的类: |
| 7. | Cryptographic analysis of a group key management scheme based on a public - key encryption algorithm 对一种基于公钥加密算法的组密钥管理方案的密码分析 |
| 8. | Typically , public - key encryption is used to encrypt a key and iv to be used by a secret - key algorithm 公钥加密通常用于加密一个私钥算法将要使用的密钥和iv 。 |
| 9. | The critical operation in public - key encryption is verifying the identity of a message s recipient , so as to encrypt with the correct public key 其中我们最喜欢的一个就是用于秘钥加密算法的“百万位密钥”广告。 |
| 10. | This paper proposes a new public - key encryption scheme which removes one element from the public - key tuple of the original cramer - shoup scheme 这里的标准模型指的是不利用随机预言机这一工具来论证体制安全性的模型。 |