1·In the implementation of the elliptic curve cryptosystem, we first have to select a secure elliptic curve.
在椭圆曲线密码体制的实现中,选取安全的椭圆曲线是首要问题。
2·In the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base-point choice algorithm of elliptic curve finite group.
实现椭圆曲线密码体制还有一个关键的步骤,就是椭圆曲线有限群基点选取算法的设计与实现。
3·This article proposes a new easy knapsack problem, based on which a novel knapsack-type public key cryptosystem is derived.
该文提出了一类新的易解背包问题,基于此问题构造了一个新的加法背包型公钥密码体制。
4·Design a user identity authentication scheme based on the elliptic curve cryptosystem.
设计了一种基于该椭圆曲线密码体制的用户身份认证方案。
5·Several convertible signcryption schemes with semantic security based on elliptic curve cryptosystem were proposed.
基于椭圆曲线密码体制建立了几个具有语义安全的可转换签密方案。
1·Based on the elliptic curve cryptosystem, a multikey sharing scheme is used.
基于椭圆曲线密码系统,采用了多键共享方案。
2·Public key cryptosystem is one of the most important research subject in modern cryptography.
公钥密码系统是现代密码学最重要的研究课题之一。
3·A cryptosystem is called semantically secure if an attacker cannot distinguish two encryptions from each other even if the attacker knows (or has chosen) the corresponding plaintexts.
如果攻击者不能彼此区分两个加密,即使攻击者知道(或已经选择)相应的明文,则密码系统被称为语义安全。
4·At present, WAP employs the certificate-based public key cryptosystem to solve related security issues.
目前,WAP中均使用以证书为基础的公钥密码系统来解决相关的安全问题。
5·And it works together with a new hardware chip to get a elliptic curve public-key cryptosystem.
并且与设计的点乘硬件芯片一起构成了一种椭圆曲线公钥制密码系统。