• Its (security) is based on the intractability of the integer factorization problem as RSA, and it is able to resist the chosen-ciphertext attack against RSA and easy to be implemented.

    RSA算法相似,其安全性基于大数因式分解难度,能够抵抗对于RSA的选择密文攻击,并且易于软件实现

    youdao

  • Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    由于敏感数据加密,任何直接数据库文件进行分析攻击方式,都只能看到密文。

    youdao

  • Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.

    高密度随机背包困难性假设,可以证明方案在唯密文攻击安全的。

    youdao

  • The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

    差分功率分析DPA方法有效地加密集成电路芯片进行攻击解密绕过了加解密算法繁琐的数学分析,从而获取密码信息。

    youdao

  • The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

    差分功率分析DPA方法有效地加密集成电路芯片进行攻击解密绕过了加解密算法繁琐的数学分析,从而获取密码信息。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定