The improvement we present can be applied to other quantum cryptographic protocol with noise.
这种改进方案对其它带有噪声的量子密码协议同样适用。
Finally, two strategies to be paid attention to are put forward when cryptographic protocol is designed.
最后,提出了设计密码协议时应注意的两点策略。
This is a cryptographic protocol that takes as its inputs, among others, any attributes to be encoded into the token.
这是在一部分输入和属性需要编码到令牌中的时候所要采用的加密协议。
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.
TransportLayerSecurity (TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.
遗憾的是,加密协议的设计是一项非常细致的工作,任何细小的错误都可能会影响到协议的安全功能。
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer (SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.
密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足该属性。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step.
形式化分析由于其精炼、简洁和无二义性逐步成为分析密码协议的一条可靠和准确的途径。
This paper introduces three basic Quantum Cryptographic Protocols. There are BB84 Protocol, HBB Protocol and BF Protocol. And also discusses study of Quantum Authentication Protocols.
该文主要介绍三个基本的量子密码协议,即BB 84协议、HBB协议和BF协议,分析了量子身份认证协议的研究现状。
The name was both an homage to cryptography (a “zero-knowledge proof” is a standard cryptographic protocol) and a promise of a specific relation between the application provider and the users.
这个名字既是对加密算法(“0知识证明”是一种标准加密协议)的致敬,也是对服务提供商和用户之间特定关系的一种约定。
In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.
在第三章中,我们首先详细介绍了水印去除攻击、密钥攻击及协议攻击。
This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.
文章简述了SSLv3.0的分层结构、协议状态、握手协议和加密参数计算,并对其安全性做出分析。
This paper includes three importance parts: the platform structure, the basis knowledge of the cryptographic and the fair exchanging protocol.
本论文的研究重点主要包括平台的架构、密码学的基本原理和公平交易协议三部分。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
A key establishment protocol is a protocol whereby a Shared secret becomes available to two or more parties, for subsequent cryptographic applications.
密钥建立协议是为了以后的密码学应用而使一个秘密密钥对两方或更多方都可用的过程。
In this paper, the author, under the full grasp of status of quantum cryptographic key research, does research concentrating on the BB84 quantum cryptographic key distribution protocol.
本文在充分掌握了量子密钥研究现状的基础上,重点针对BB 84量子密钥分配协议展开了研究。
Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core.
信息安全主要是由安全协议和密码算法组成,其中密码算法是信息安全的基础和核心技术。
The PAGKA protocol suite is communication efficient, and has the following cryptographic properties such as key independence, implicit key authentication, perfect forward secrecy and resistance .
通过引入群公钥证书并在群密钥中结合群以及成员的长期密钥和临时密钥,提供了隐含密钥认证,以有效地对抗中间人攻击。
According to the" nono n-repudiation game of Hanoi Tower", This paper analyzes a fair and non-repudiation signed-contract-cryptographic-protocol(SCCP)with strong safety.
文章以“汉诺塔”游戏为出发点,分析设计了一个高强度的公平的不可抵赖的签约协议。
According to the" nono n-repudiation game of Hanoi Tower", This paper analyzes a fair and non-repudiation signed-contract-cryptographic-protocol(SCCP)with strong safety.
文章以“汉诺塔”游戏为出发点,分析设计了一个高强度的公平的不可抵赖的签约协议。
应用推荐