• For cryptologic applications, it is of course highly disirable that the linear complexities of pseudorandom sequences be as large as possible, and the sequences resist the correlation attack.

    对于流密码体制中使用伪随机序列,我们要求既要有尽可能线性复杂度要能抗相关攻击。

    youdao

  • This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.

    本文论述信息安全威胁密码体制,描述密码技术领域标准化组织机构开发应用出口限制

    youdao

  • This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.

    本文论述信息安全威胁密码体制,描述密码技术领域标准化组织机构开发应用出口限制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定