cryptosystem造句1. In general, any new cryptosystem could harbor serious flaws that are discovered only after years of scrutiny by cryptographers.
2. Research on the Cryptosystem Related to Secret Key Security.
3. A cryptosystem based on recombinant DNA technique is presented.
4. The Public-Key Cryptosystem is an important branch of Cryptosystem.
5. That breaking the new cryptosystem is equivalent to factoring a general large integer have been showed. A new digital signature scheme and a new authentic encryption scheme have been designed.
6. RSA cryptosystem, a public-key cryptosystem that being used widely today, seems to have difficulty to meet the user's need of higher security.
7. Another popular secret - key cryptosystem is the International Data Encryption Algorithm ( IDEA ).
8. Elliptic Curve Cryptosystem(ECC) is a kind of public-key cryptosystem based on algebraic curve.
9. In this paper we discuss one cryptosystem which based on the theory of the finite automaton.
10. RSA is the most widely used public-key cryptosystem in the world.
11. Knapsack public-key cryptosystem is characterized by fast encryption and decryption.
12. The RSA public-key cryptosystem is one of the widely used public-key cryptosystems.
13. Elliptic curve public-key cryptosystem(ECC)'s security is based on the intractability of the elliptic curve discrete logarithm problem.
14. A public-key cryptosystem based on error correcting codes is presented. This public-key cryptosystem can perform signature, encrypting, error detecting and error correcting simultaneously.
15. In the absence of mathematical proofs of security, nothing builds confidence in a cryptosystem like sustained attempts to crack it.
16. It is very important to investigate the decomposition of weakly invertible finite automata, since it could provide an approach to cryptanalyzing finite automata public-key cryptosystem(FAPKC).
17. This paper proposes a short designated verifier signature scheme based on self - certified cryptosystem.
18. Based on the security of the discrete logarithmic problem, the RSA public-key cryptosystem and the one-way function, proposed a new security enhanced method of a threshold proxy signature scheme.
19. Maxim No. 2: Only a cryptanalyst, if anybody, can judge the security of a cryptosystem.
20. Compared with M public-key system and some variants, the performance of the public - key cryptosystem was analyzed.
21. Studies scalar multiplication algorithms to speed up the elliptic curve cryptosystem.
22. This is perhaps a trivial example, but analysis of the type I have just described can be the thin end of the wedge in penetrating a cryptosystem.
23. The RSA function is one-way function, promising RSA public-key cryptosystem the safety thus.
24. Usually modular inverse operation becomes bottlenecked in realizing the public key cryptosystem.
25. And it works together with a new hardware chip to get a elliptic curve public-key cryptosystem.
26. Only a cryptanalyst , if anybody, can judge the security of a cryptosystem.
27. In this paper, we propose a new digital watermarking algorithm based on quadratic knapsack problem, which belongs to public-key cryptosystem.
28. According to matrix character display communication technology, we suggested a new cryptosystem.
29. This paper gives a solution by using Elliptic Curve Cryptosystem ( ECC ) as the public key scheme.
30. Because the new algorithm extends the state component of the automata, which makes constructing automata more complex, the security will be improved and it's harder to break into this cryptosystem.