点击切换搜索课件文库搜索结果(990)
文档格式:PPT 文档大小:405KB 文档页数:63
Iterating Block ciphers Definition A product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components. Definition An iterated block cipher is a block cipher involving the sequential repetition of an internal function called a round function. Parameters include the number of rounds Nr, the block bitsize n, and the bitsize k of the input key K from which Nr subkeys Ki (round keys) are derived. For invertibility (allowing unique decryption), for each value Ki the round function is a bijection on the round input
文档格式:PPT 文档大小:159.5KB 文档页数:56
Definitions – Digital Signature - a data string which associates a message with some originating entity – Digital Signature Generation Algorithm – a method for producing a digital signature – Digital signature verification algorithm - a method for verifying that a digital signature is authentic (i.e., was indeed created by the specified entity)
文档格式:PPT 文档大小:51KB 文档页数:22
Numbers Integers Real Arithmetic Operations Addition and subtraction Multiplication and division Exponentiation and logarithm
文档格式:PPT 文档大小:278KB 文档页数:56
Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
文档格式:PPT 文档大小:1.92MB 文档页数:68
Public-Key Applications can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys)
文档格式:PPT 文档大小:107KB 文档页数:34
一、资格认证 1.方式:考试,每年1次(3月,5月,9月) 2.科目:会计、审计、财务成本管理、经济法、税法
文档格式:PDF 文档大小:1.84MB 文档页数:92
1. 为什么需要WLAN? 2. 认识802.11 3. 认识频谱 4. WLAN的结构 5. WLAN的各种标准 6. WLAN的加密与认证
文档格式:PDF 文档大小:1.17MB 文档页数:34
复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(1/2)Authentication - 身份认证
文档格式:PDF 文档大小:1.09MB 文档页数:6
基于广义混沌同步系统(GS)和广义离散Sinai映射,提出了具有非对称密钥的数字图像安全通讯方案.方案能通过一个常规的语音信号隐藏几乎所有计算机所能识别的图像文件,以实现信息的伪装与隐藏,且含有24个密钥数并能无损恢复隐藏图像,密钥空间可达到10360.该方案能使接收方利用非对称密钥对收到的密文进行数据源真伪性认证和解密,适用于网络数字通讯语音伪装中的图像传输.对密钥空间、密钥参数敏感性和加密图像的相关性等分析表明该方案具有较高的安全性
文档格式:PPT 文档大小:107KB 文档页数:34
❑资格认证 一般了解 ❑业务范围 熟练掌握 ❑会计师事务所 一般了解 ❑注册会计师协会 一般了解 ❑行业管理 熟练掌握
首页上页910111213141516下页末页
热门关键字
搜索一下,找到相关课件或文库资源 990 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有