Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
Be signed with a strong name using standard public key cryptography.
使用标准公钥密码系统用强名称签名。
This asymmetry is the property that makes public key cryptography so useful.
这个非对称的特性使得公钥加密很有用。 。
The scheme perfectly integrates digital signature scheme with public key cryptography system.
该方案是数字签名与公钥密码体制的有机集成。
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
The set registry tool allows you to change the registry Settings for public key cryptography.
设置注册表工具使您得以更改公钥密码的注册表设置。
The wide use of public key cryptography requires the ability to verify the authenticity of public keys.
公钥密码学的广泛应用使得公钥真实性的可验证性成为必要条件。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
Certificateless public key cryptography resolves the key escrow problem and public key authentication problem.
无证书公钥密码体制解决了密钥托管问题和公钥认证问题。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography.
而公钥密码算法正好可以解决这方面的问题,但在速度上远远不及对称密码算法。
Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.
以密码学中的公钥思想为基础,提出了一种基于原根的数字图像置乱技术。
This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.
该方案主要以目前比较成熟的公钥密钥学理论为基础,用到了RSA加解密、摘要、数字信封等算法。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.
公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。
Most security applications are increasingly using public key cryptography. It leads to a pressing need for a PKI (public key Infrastructure) to support the distribution of public keys.
大多数的安全应用现在都引入公钥密码算法,而公钥密码算法需要公钥基础设施PK I来支持公钥的分发。
In this paper, we propose a novel secure multicast scheme with key agreement based on Elliptic Curve Cryptosystem and group communication inside Identity-based Public key Cryptography system.
提出一个应用椭圆曲线密码体制进行密钥协商而在基于身份的公钥系统内进行组通信的全新安全组播方案。
Public key infrastructures (PKI) achieve authentication and key exchange by utilizing public key cryptography; however, the system's centralized models tend to be the bottleneck in the network.
公钥基础设施(PKI)通过公钥算法来实现身份认证和密钥交换,但由于其采用集中管理的模式,容易成为网络访问的瓶颈。
The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.
辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,但是目前基于辫子群的密钥协商协议AAG、AAFG和BDH等都有不同程度的安全弱点。
While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.
虽然听起来这并不是什么了不起的事,但分解并找到一个离散对数的困难形成了大部分公用密钥密码学系统的基础,如果不是全部的话。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
应用推荐