您要查找的是不是:
- RSA加密体制的安全隐患 Hidden security flaws of RSA encryption system
- 目前的加密体制仍以公钥体系为主流 ,且最常见的密钥选取方法就是选取一个具有某种特征的随机数 ,因此随机数的好坏就直接影响到密钥的安全 ,从而也就影响到整个加密体系的安全。 At present, the public key system is still the major one in the encryption system, and the commonest method in private key selection is to choose a random number with a certain feature, which will influence the security of the private key and the whole encryption system.
- EIGamal加密体制 EIGamal cryptosystem
- 新方案克服了已提出方案的安全隐患,并且具有通信量小、算复杂性低等优点。 The new scheme overcomes the security leaks and has the merits of little communication and low computation complexity etc.
- 公开密钥加密体制 open encrypt system
- RSA加密在DNS安全中的应用 Application of RSA Encryption Technology in DNS Security
- rsa加密技术 RSA encryption technique
- 每班次至少巡查全公寓区域一遍,及时发现事故苗头,详细纪录所发现的安全隐患情况。 Inspections at least every frequency entire apartment regional again, the symptoms timely detection of the incident, detailed records find potential safety problems.
- 关于数论在公开密钥加密体制中的应用 The Application of Number Theory in Public Key Crypto System
- RSA加密 RSA
- 电子邮件系统的安全隐患及解决方法 Potential security risk of the E-mail system and its prevention solutions
- RSA加密算法 RSA encryption algorithm
- 一种基于RSA密码体制的盲签名方案 Untraceable Blind Signature Scheme Based on the RSA Cryptosystem
- 加油站防雷接地与防静电接地不共用造成的安全隐患 Hidden Danger of Safety Caused by Separate Ground Connection between Thunder Prevention and Static Electricity Prevention in Petrol Station
- 公司是否于所有工程实行严谨的安全、保安及环境管制措施? Does the organisation implement strict safety, security and environmental controls on all projects?
- RSA加密方案 RSA encryption scheme
- 在分析现有电子支付系统的基础上,通过引入电子钱包,采用混合加密体制和数字签名技术,提出了一种新的基于电子钱包的电子现金支付协议。 With analyzing the current electronic cash system,this paper describes an electronic cash protocol based on e- wallet ,which makes use of hybrid crytosystem and digital signature scheme on the basis of electronic wallet.
- 关于健全安全监管体制的探讨 Discussion on safety supervision system well established
- 火灾/安全隐患 a fire/safety hazard
- RSA加密算法及一般攻击方法 RSA Encoding Computation and Common Attack Methods