In cryptanalysis, a triple of successive letters.
密码分析中的一组三个连续字母。
The field that encompasses both cryptography and cryptanalysis.
包含加密技术和密码分析(学)两部分的学科领域。
Cryptanalysis: The analysis and deciphering of cryptographic writings or systems.
密码分析:对密码书写或密码系统的分析和译解。
Cryptanalysis of two different kinds of symmetric chaotic cryptosystems is presented.
分别对两种对称混沌密码系统进行了密码分析。
Fast correlation attack is one of the important cryptanalysis method for stream ciphers.
快速相关攻击是一种重要的序列密码分析方法。
Design and cryptanalysis on group signature is always the hotspot in the field of cryptography.
对群签名的设计与分析始终是密码学领域的一大热点。
Source code for all these algorithms is in the public domain and has undergone years of cryptanalysis.
为所有这些算法的来源代码在公众领域里和经受了密码学分析。
A differential cryptanalysis of the iterated block cipher based on the new round function is presented.
对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。
Design and cryptanalysis on group (blind) signature is always the hotspot in the field of cryptography.
对群(盲)签名的设计与分析始终是密码学领域的一大热点。
Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.
在分组密码的设计中,提高分组密码的抗差分攻击性能是一个重要的课题。
With cryptanalysis, the fact that data is encrypted is obvious: You need only observe the data to determine whether it is encrypted.
使用隐写式密码解密,您需要观察数据并确定它是否加密。
Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology.
整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.
最后,密码分析学的进步可以使任何加密机制或算法变得不再安全,因为总是有新奇的破解方法被找出来。
In this paper, the Sequential Probability Ratio Test (SPRT) is introduced to cryptanalysis to reduce the amount of keys needed in correlation attacks.
本文把序贯概率比检验引入到密码分析中,用来约减相关攻击所需的密钥量。
The cipher design combines the wide trail strategy and bit-slice technology that ensure the resistance AC against differential and linear cryptanalysis.
AC分组密码的设计结合了宽轨迹策略和比特块技术,以确保算法对差分密码分析和线性密码分析的安全性。
Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.
对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
Therefore, using large completely nonsingular matrix based substitution permutation networks can effectively improve cipher security in relation to differential cryptanalysis.
指出了使用大规模的基于全奇异矩阵的代替置换网络可有效地提高分组密码抗差分密码分析的安全性。
During the Second World War Turing worked at Bletchley Park, Britain's code-breaking centre, and was for a time head of Hut 8, the section responsible for German naval cryptanalysis.
二战期间,图灵在布莱切里公园工作,这里是英国破译密码的中心,一段时间里他作为“Hut8”部门的头,这个部门负责德国海军的密码翻译工作。
SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.
SPN结构是一种流行的分组密码总体结构;差分和线性分析是攻击分组密码的最强有力的方法。
In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.
给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
The main problem of side- channel cryptanalysis is to grasp the in- formation leakage mechanism in chip, and to build information leakage model for leakage signal statistical analyzing.
其关键问题在于掌握芯片运行过程中泄漏信息的机理,进而建立统计分析泄漏信号的信息泄漏模型。
This paper introduces a completely nonsingular matrix based substitution permutation network that can effectively improve the performance of the block cipher against linear cryptanalysis.
论文介绍了一种基于全非奇异矩阵的代替置换网络,它可有效的提高分组密码抗线性密码分析的能力。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.
多重线性密码分析是线性密码分析方法的一种推广,如何利用多重线性密码分析方法来攻击DES一直是人们关注的焦点。
Realizing this design provide not only one way for studying in theory. but also application for cryptanalysis in practice, it can analyse cipher and be regarded as a (assistant) tool of cryptanalysis.
本设计的实现不但为其理论研究提供了一种手段,而且为密码分析提供了实践上的应用,既可以进行破译分析也可以作为一个密码分析的(辅助)工具。
Realizing this design provide not only one way for studying in theory. but also application for cryptanalysis in practice, it can analyse cipher and be regarded as a (assistant) tool of cryptanalysis.
本设计的实现不但为其理论研究提供了一种手段,而且为密码分析提供了实践上的应用,既可以进行破译分析也可以作为一个密码分析的(辅助)工具。
应用推荐