高分就简短的翻译:中文→英文(用翻译软件的不要来了)

[复制链接]
查看11 | 回复3 | 2006-5-19 15:57:45 | 显示全部楼层 |阅读模式
Leap of science and technology development, business, governmental affairs of information-based, make the password technique- this kind of takes mathematics as the basal course technique to have the extensively applied foreground.For example the numerical signature technique that regards the RSA, ElGarmal and ECC as the representative etc., however the NTRUmale keypassword system appear in the last few years with borrow it fast in add decrypt, efficiently sex and very high safety, became hot point within the password research.But the threshold password learn to be the modern password to learn medium branch for stimulate, having the very important function in the real life.This text mainly studies of is the threshold password to learn and male key system of NTRU.This text is in chapter 1 the background that the male key password of simple introduction learns the development, the history of the development.Then the point introduction NTRU male key calculate way and the threshold passwords learn the process of the development, and introduce the password of the Brickell vector spaceshare project[10].Chapter 2 will to the NTRU in the bobtail polynomial wreath of add and decrypt the work carries on the introduction and analysis.Combine at the behind with a possibility that verifies the male key calculate way of NTRU, end in chapter 2, we will make an analysis and discussions towards decrypting the born and medium parameter choice of accuracy and key of 密s.Chapter 3 will is a foundation that aims at the polynomial to share the project to make an adjustment to the password of the Brickell vector space up according to the male key calculate way of NTRU, then give a kind of key with male new threshold NTRU encrypts the project, being alongside of an example to verify this project, will do a little simple safety analysis of to this new project finally.
回复

使用道具 举报

千问 | 2006-5-19 15:57:45 | 显示全部楼层
楼上的已经写的很好了。
回复

使用道具 举报

千问 | 2006-5-19 15:57:45 | 显示全部楼层
The rapid development of technology, business, the Chief of informationization, making password technology-based disciplines such mathematical techniques to a wide range of applications. For example, represented by RSA,ElGarmal and ECC digital signatures technology, but which has emerged in recent years NTRU public key cryptographic system, by virtue of its rapid increase declassified, high efficiency and high security has become a hot research codes. And the threshold of modern cryptography as a dynamic branch of cryptography, in real life a very important role. This major study is the threshold and NTRU public key cryptography system. In the first chapter of this simple introduction to the development of public key cryptography background, the development of history. Further highlights NTRU public key cryptography algorithms and threshold development process, and the vector space on Brickell passwords [10] sharing programme. Chapter II will be closed Mei polynomial Central NTRU in the presentation and analysis of the decryption work. And in the back with a simple example to test the feasibility of NTRU public key algorithms, in the final two chapters, we will declassification correctness of the parameters and key generation options analysis and discussion. Chapter III will be based on the NTRU public key algorithm is based on Brickell against polynomial vector space programme password sharing adjustments, and then given a new threshold NTRU public key encryption programme, and then use an example to test the programme, Finally this new programme will make a simple point safety analysis.
回复

使用道具 举报

千问 | 2006-5-19 15:57:45 | 显示全部楼层
我也赞同
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

主题

0

回帖

4882万

积分

论坛元老

Rank: 8Rank: 8

积分
48824836
热门排行