public key encryption造句1 Modular exponentiation algorithm is widely used in public key encryption technology.
2 To evaluate the IND-CCA2 security of public key encryption schemes, proposed the gray-box analysis of IND-CCA2 security.
3 By using the well-known RSA public key encryption algorithm, this paper gives a newauthenticated encryption scheme based on the division of digital image.
4 A brief description of some basic schemes of public key encryption and digital signature is presented.
5 In the paper, public key encryption algorithm-RSA and the application in digital signature are mainly discussed and analysed.
6 The algorithm selection shows RSA suits public key encryption and AES is good for voice encryption.
7 The task implement RSA public key encryption algorithm with Montgomery algorithm.
8 A mutual authentication protocol based on public key encryption is presented for mobile communication system.
9 A novel public key encryption scheme with multiple private keys is presented.
10 PKI is an infrastructure that provides a full set of security toe-commerce and e-government obeying the standard public key encryption technique.
11 On this thesis, the research has been taken about the public key encryption and digital signature after our scrutinizing on GSM short message and the SMPP Protocol.
12 ADFS uses a set of secure protocols like SSL and Public Key encryption to provide Single Sign On to applications that are not hosted inside your network.
13 Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.
14 It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity,[www.] but also has advantage of public key encryption scheme on key distribution and key management.
15 A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
16 Secondly, after summarizing a series of related works, we present the notion, security model, as well as the first concrete scheme for multi-receiver certificateless public key encryption.
17 Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.
18 The problem was a famous one in the field – it had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.
19 PKI is a basic platform for safe internet corresponding. It obeys the standard public key encryption technique.
20 There are two basic types of encryption methods, namely the private key encryption and public key encryption.
21 The improved scheme adopts combined technologies of verifiable secret sharing, public key encryption and random numbers.