Sentencedict.com
 Directly to word page Vague search(google)
Home > Public-key in a sentence

Public-key in a sentence

  up(0)  down(0)
Sentence count:60Posted:2023-03-22Updated:2023-03-22
Similar words: public key encryptionrepublic of turkeypublic knowledgepublic policypublicpublicanpubliclyrepublic
Random good picture Not show
(31) Elliptic curve public-key cryptosystem(ECC)'s security is based on the intractability of the elliptic curve discrete logarithm problem.
(32) The RSA function is one-way function, promising RSA public-key cryptosystem the safety thus.
(33) And it works together with a new hardware chip to get a elliptic curve public-key cryptosystem.
(34) A public-key cryptosystem based on error correcting codes is presented. This public-key cryptosystem can perform signature, encrypting, error detecting and error correcting simultaneously.
(35) In this paper, we propose a new digital watermarking algorithm based on quadratic knapsack problem, which belongs to public-key cryptosystem.
(36) One disadvantage of public-key system is that they are slower than secret-key systems.
(37) Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
(38) Public-key cryptography is one of the most important research direction of encryption, using mathematical function to construct public-key encrypt arithmetic is the nucleus of it.
(39) KD-SNFS combines the symmetric-key encryption algorithm and the public-key encryption algorithm to ensure the security of files.
(40) Elliptic curve cryptosystem is a kind of public-key cryptosystem based on algebra curve.
(41) Through the cryptanalysis of a threshold proxy signature scheme based on bilinear pairings(sentencedict.com), it was found that the scheme couldn't resist forgery attack and public-key substitute attack.
(42) A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).
(43) public-key encryption The key distribution problem has always been the weak link in the secret - key systems.
(44) This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which uses only one private key.
(45) In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.
(46) Users of public-key encryption have a private key and a public key, and they share their public keys with other users.
(47) The paper has an introduction to public-key encryption and the technology of the digital signature, with the emphasis on the one to one secure communication and signing of many people.
(48) The RSA cryptosystem, which is a public-key cryptosystem being used widely nowadays, seems to have difficulties to meet the users' need of higher security.
(48) Wish you can benefit from our online sentence dictionary and make progress day by day!
(49) This paper presents a public-key cryptosystem based on intractable for solving high order equation and intractable for factoring large number.
(50) Party A dedicated key can only be decrypted by its public-key encryption of any information.
(51) As a new branch of public-key cryptosystem, digital signature is a key technology of the secure B2B (Business to Business) and government affair in recent years.
(52) Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
(53) As a major public-key cryptographic algorithm, RSA cryptographic algorithm occupies an important position in the operator's authentication of electricity market operation system.
(54) See Resources for links to more information on digital certificates and public-key encryption in general.
(55) Public-key cryptography is one of the most important research field of encryption, using mathematical function to construct public-key encrypt arithmetic is the nucleus of it.
(56) It is essential for a public-key encryption scheme to discover a one-way trap-door function.
(57) These two types of public-key cryptosystem their advantages and disadvantages.
(58) A fast public-key cryptosystem is proposed to remedy this drawback.
(59) An area efficient modular arithmetic processor was developed that is capable of performing RSA public-key cryptography and other modular arithmetic operations as a coprocessor.
(60) The public-key system uses a pair of mathematically related sequences, one for encryption and the other for decryption.
More similar words: public key encryptionrepublic of turkeypublic knowledgepublic policypublicpublicanpubliclyrepublicin publicnonpublicpublicizeRepublicanpublicitypublic aidpublic lawpublicistpublicisepublicallypublic eyepublic housepublic landspublic bodysemipublicpublic debtpublic moneypublicisedpublic offerpublicizedpublic goodpublicness
Total 60, 30 Per page  2/2  «first  pre  last»  goto
Leave a comment
Welcome to leave a comment about this page!
Your name:
Latest commentsInto the comment page>>
More words