海词手机词典
  • This scheme is based on public-key algorithm and the key is shared by polynomial. This scheme can realize digital signature, authentication, encrypt and decrypt. In the process the private key will not be revealed.

    播放读音 播放读音