在 英语 中使用 Public-key encryption 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
SSL uses RSA public-key encryption for specific TCP/IP ports.
For this, PGP combines symmetric-key encryption and public-key encryption.
Public-key encryption(PKE) came into existence in the year 1976.
(Note that with enough computational power, any public-key encryption can be broken).
In public-key encryption, each computer(or user) has a public-private key pair.
We will cover the relevant number theory and discuss public-key encryption and basic key-exchange.
Public-key encryption provides a solution to key distribution and data transmission issues.
As mentioned earlier, when doing public-key encryption, you need to have the recipient's public keys.
Public-key encryption(used primarily for key exchange) and digital signatures are more complicated.
(2) The mathematical procedures used for generating authorized digital signatures under[this Law][these Rules]are based on public-key encryption.
Public-key encryption(used primarily for key exchange) and digital signatures are more complicated.
An IBM researcher has solved a thorny mathematicalproblem that has confounded scientists since the invention of public-key encryption several decades ago.
Public-key encryption protocols are complicated, and in computer networks, they're executed by software.
Because of these problems,secret-key encryption is often used together with public-key encryption to privately communicate the values of the key and IV.
Public-key encryption protocols are complex, and in computer Networks, they're executed by software.
Provers with enough computational power can createproofs/arguments about wrong statements(Note that with enough computational power, any public-key encryption can be broken).
Public-key encryption protocols are complicated, and in computer networks, they're executed by software.
Like most modern public-key encryption systems, the researchers' chip uses a technique called elliptic-curve encryption. .
Public-key encryption protocols are complicated, and in computer networks, theyre executed by software.
This category also includes public-key encryption algorithms- such as RSA and Elliptic Curve cryptography- that do the same thing, but are less efficient.
Public-key encryption protocols are very complicated, and in the world of computer networks, they're executed by software.
Therefore, public-key encryption is less susceptible to exhaustive attacks that try every possible key.
Public-key encryption uses a private key that must be kept secret from unauthorized users and a public key that can be made public to anyone.
Public-key encryption(PKE) requires the use of a key management tool to either generate private and public keys, or to import public keys.