认证加密算法,AEAD
1)AEAD认证加密算法
1.Research on Application of AEAD Techniques for CCSDS Telecommand Protocol认证加密算法在CCSDS遥控协议中的应用研究
英文短句/例句

1.Research on Application of AEAD Techniques for CCSDS Telecommand Protocol认证加密算法在CCSDS遥控协议中的应用研究
2.Certificate-based hybrid encryption scheme in the standard model标准模型下基于认证的混合加密算法
3.Research on Optimizing Encryption-authentication Mode of EAX in AES AlgorithmAES算法EAX加密认证模式优化技术研究
4.Authentication Research Based on HDCP Protocol and Stream Cipher Algorithm Implementation;基于HDCP协议的认证研究与流加密算法的实现
5.An authentication design of PKI based on some cryptography algorithms analysis;一种基于加密算法分析的PKI身份认证方案
6.Research on the Authentication Protocol and Cryptographic Algorithm in RFID System基于RFID系统认证协议与加密算法的研究
7.Deniable Authentication Protocol Based on Public Key Algorithm基于公开密钥算法的可否认认证协议
8.Implementation of Elliptic Curve Cryptography Algorithm in Identity Authentication and Software Register椭圆曲线加密算法在身份认证及软件注册中的实现
9.The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy.这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。
10.Design and Verification of AES Encryption IP CoreAES加密算法IP核的设计与验证
11.Security Proof of Public-key Encryption Algorithm Rabin-OAEP公钥加密算法Rabin-OAEP安全性证明
12.In addition, this model protects the password using encryption algorithm, and can defend the attack of replay and sniffing.此外,该认证模型利用加密算法对口令信息进行了保护,能防范重放和窃听等攻击手段。
13.Note to the Authentication Operate Modes of Block Cipher and Provable Security分组密码算法认证运算模式的注记及可证安全性
14.Research on Algorithms and Implmentations of Database Encryption and Authentication;数据库加密与验证的算法和实现机制研究
15.The data cannot be decrypted because the key encryption algorithm it used does not match that of your certificate.由于它所使用的密钥加密算法与您证书中的算法不匹配,无法对这些数据进行解密。
16.An Improvement of the Authenticated Encryption Ma-Chen Program Certificated Publicly;公开验证认证加密Ma-Chen方案的改进
17.A New Authenticated Encryption Scheme with Public Verifiability;一个新的可公开验证的认证加密方案
18.Research on Password-Based Authentication and Key Exchange Protocol for Low Power Devices适用于弱计算能力设备的口令认证与密钥交换方法的研究
相关短句/例句

authenticated encryption认证加密
1.Security analysis of authenticated encryption based on Oracle model;基于Oracle模型的可认证加密协议安全性分析
2.Improvement of proxy convertible authenticated encryption schemes;代理可转换认证加密方案的改进
3.Convertible authenticated encryption scheme with message linkages;具有消息链接的可转换的认证加密方案
3)authentication and encryption认证加密
1.For the application of intelligent memory IC card, it is critical to design a suitable method of authentication and encryption.从逻辑加密 IC卡的特点与认证加密设计的原则出发 ,比较了当前密码学领域中常用加解密算法的优缺点 ,提出了一个便于芯片实现 ,经济合理的逻辑加密 IC卡认证加密方案 。
2.In the existing authentication and encryption program,if the signer denies his signatures to any other receiver cannot verify the honesty of the signature verification.现有的认证加密方案中,如果签名者否认签名,接收者不能向其它任何验证者证实签名者的诚实性。
4)authenticated encryption加密认证
1.The TAE (tweakable authenticated encryption) mode is an authenticated encryption mode which is based on a tweakable block cipher.TAE(tweakable authenticated encryption)模式是一种基于可调分组密码的加密认证模式。
5)encryption/authentication加密/认证
6)Encryption/Authentication algorithm加密/验证算法
延伸阅读

自愿性认证(见产品合格认证)自愿性认证(见产品合格认证)voluntary certification: see product conformity certification  Z叨anxing renzheng自愿性认证(volun娜cert讥cation)合格认证。见产品