• After being perturbed, chaotic system can generate chaotic binary sequences with uniform distribution and with statistic properties invulnerable to cryptographic analysis.

    扰动系统服从均匀分布,具有更为理想的扩散特性置乱特性

    youdao

  • Cryptanalysis: The analysis and deciphering of cryptographic writings or systems.

    密码分析密码书写密码系统分析译解

    youdao

  • Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step.

    形式化分析由于精炼、简洁无二义性逐步成为分析密码协议一条可靠准确途径

    youdao

  • The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    密码协议分析设计基础进行形式化建模

    youdao

  • The random order execution which used in cryptographic ICs is a kind of few redundancy and low power countermeasures against power analysis attacks.

    执行密码芯片设计中一余、低功耗抵抗功耗分析攻击的方法。

    youdao

  • It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.

    利用形式化分析密码协议方法检测密码协议潜在的安全漏洞,已成为密码学一个新的研究方向

    youdao

  • Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols.

    密码协议运行模式分析法基础,利用模型检测理论结果,提出了三方密码协议运行模式分析法。

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • However, with the improvement of signal measurement and analysis technologies, cryptographic circuits are facing many kinds of attacking methods.

    然而随着测量技术分析技术不断进步,出现了许多破解加密集成电路攻击方法

    youdao

  • The simulation software conducts the power analysis of cryptographic algorithm IP core which is described by hardware language.

    软件完成硬件描述语言实现密码算法IP进行功耗分析

    youdao

  • Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.

    安全协议特别是认证协议非形式化分析复杂现代通信中变得尤其重要

    youdao

  • The design and analysis of cryptographic protocols are notoriously complex and error prone.

    因此密码协议设计密码协议分析信息安全领域难题。

    youdao

  • The design and analysis of cryptographic protocols are notoriously complex and error prone.

    因此密码协议设计密码协议分析信息安全领域难题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定