PUBLIC-KEY CRYPTOGRAPHY in Chinese translation

公钥密码学
的公钥密码学
公共密钥加密
公钥加密术

Examples of using Public-key cryptography in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
It should be noted, however, that the concept of public-key cryptography does not necessarily imply the use of the above-mentioned algorithms based on prime numbers.
不过,应当指出,公用钥匙加密的概念并不一定意味着利用上述以素数为基础的算法。
The problem of transferability, on the other hand, can be solved by using public-key cryptography.
另一方面,通过使用公钥加密来解决可转移性问题。
In short, public-key cryptography, together with digital scarcity, have given us digital hard money.
简而言之,公钥加密技术与数字稀缺性给我们带来了数字货币。
Hash functions and public-key cryptography are at the core of digital signature systems, which are now applied to a wide range of use cases.
散列函数和公钥密码学是数字签名系统的核心,数字签名现已在各类案例中得到了应用。
Public-key cryptography is not meant to replace secret-key cryptography, but rather to supplement it, to make it more secure.
因此,公钥加密算法不会取代对称加密,而是对后者的补充,使其更安全。
However, NIST and other security industry watchdogs predict that within a decade, large-scale quantum computing will break RSA public-key cryptography.
然而,美国国家标准与技术研究院(NIST)及其他安全机构预测,大规模量子计算将在十年内破解RSA和ECC公钥加密算法
The problem of transferability, on the other hand, can be solved by using public-key cryptography.
另一方面,可转移性的问题可通过利用公钥密码学来解决。
As previously noted, though, asymmetric encryption and digital signatures are two major use cases of asymmetric cryptography(public-key cryptography).
如前所述,非对称加密和数字签名是非对称密码学(公钥加密)的两个主要用例。
Specifically, Dwork and Naor proposed three candidate puzzles that could be used for the purpose, all based on public-key cryptography and signature schemes.
具体来说,Dwork和Naor提出了三个可用于此目的的候选谜题,所有这些都是基于公开密匙加密和签名方案。
A quantum computer that can run Shor's algorithm could crack the public-key cryptography used to store much of our data.
一台能够运行肖尔算法的量子计算机可以破解用来存储我们大量数据的公钥密码
The problem of transferability, on the other hand, can be solved by using public-key cryptography.
另一方面,可移植性问题可以通过使用公钥密码学来解决。
Specifically, Dwork and Naor proposed three candidate puzzles that could be used for the purpose, all based on public-key cryptography and signature schemes.
具体来说,Dwork和Naor提出了三个可用于此目的的候选谜题,它们全部都基于公钥加密和签名方案。
In"New Directions in Cryptography," Diffie and Hellman presented an algorithm that showed that asymmetric or public-key cryptography was possible.
在『NewDirectionsinCryptography』(密码学新方向)一文中,Diffie和Hellman展示了一种算法,表明非对称加密或是公共密钥加密是可行的。
Whitfield Diffie and Martin Hellman(2015 recipients) invented public-key cryptography- the security ingredient that permits us, for example, to enter credit card numbers online with confidence.
WhitfieldDiffie和MartinHellman(2015年图灵奖获奖者)发明了公共密钥加密技术,这种安全技术使我们能够放心地在线输入信用卡号。
Therefore, this feature increases the integrity of the system, in addition to protecting against hackers, and strengthens the system beyond its strong public-key cryptography base.
因此,这一特性增加了系统的完整性,以及防范黑客的能力,并加强了系统超越其强大的公钥加密的坚实基础。
Therefore, this feature increases the integrity of the system, in addition to protecting against hackers, and strengthens the system beyond its strong public-key cryptography base.
因此,这一功能提高了系统的完整性和防止黑客的能力,并为系统超越其强大的公钥加密奠定了坚实的基础。
Digital signatures relying on public-key cryptography 35-62 18.
依靠公用钥匙加密的数字签字35-6215.
That doesn't mean the end of public-key cryptography, though.
但这并不意味着公钥密码技术的终结。
Public-key cryptography can be used for sender authentication, known as digital signatures.
利用公开密钥加密方法可以用于验证报文发送方,这种技术称为数字签名。
Since the 1970s, cryptologists have been trying to use NP-complete problems for public-key cryptography.
从20世纪70年代开始,密码学家才尝试将NP完全问题用于公开密钥密码系统中。
Results: 73, Time: 0.0376

Word-for-word translation

Top dictionary queries

English - Chinese