ecc

  • 网络纠错码(error correcting code);椭圆曲线加密法(Elliptic Curve Cryptography);椭圆曲线密码

eccecc

ecc

纠错码(error correcting code)

纠错码 (ecc) 逻辑集成在 cortex-r4f cpu 中,从而可保护存储器与总线。由于 ecc 的评估在 cpu 内部进行,因此系统可充分发挥 …

椭圆曲线加密法(Elliptic Curve Cryptography)

椭圆曲线加密法ECC)是一种公钥加密技术,以椭圆曲线理论为基础,在创建密钥时可做到更快、更小,并且更有效。ECC …

椭圆曲线密码

椭圆曲线密码ecc)算法的fpga实现及优化设计 详细»回到顶部 文档分类 我要上传 会议 社区 移动 商业工具 豆丁书房 登录 注册

椭圆曲线加密(Elliptic Curve Crypto)

椭圆曲线加密ECC)中,利用了某种特殊形式的椭圆曲线,即定义在有限域上的椭圆曲线。其方程如下:y2=x3+ax+b(mod …

1
" Tomorrow morning the IEC and ECC will meet together to establish a procedure to implement the decision, " he said . 独立选委会和选举投诉委员会明天早晨将举行会晤,确立施行这项决定的程序。
2
The ECC detailed its findings, but did not present fresh tallies for rival candidates. 选举投诉委员会公布了调查的详细结果,但没有公布各位竞选对手的最新票数。
3
The implementation speed of Elliptic Curve Cryptography (ECC) depends on the implementation speed of elliptic curve point multiplication. 椭圆曲线点乘的实现速度决定了椭圆曲线密码算法(ECC)的实现速度。
4
The security of the Elliptic Curve Cryptography (ECC) is built upon the difficulty of solving the elliptic curve discrete logarithm problem. 椭圆曲线密码体制的安全性建立在椭圆曲线离散对数问题的难解性上。
5
SANY ECC has transformed the conventional mode in the industry, where clients used to seek help directly from field service engineers. 三一企业控制中心改变了业界内客户直接求助现场服务工程师的传统模式。
6
This media was written with software ECC and cannot be read by this application . 此媒体是用软件ECC所写入的,因此无法被该应用程序读取。
7
The software for strong encryption using ECC or FIPS-certified technology must be ordered separately. 使用ECC或FIPS认证技术进行高度加密的软件必须单独订购。
8
The evaluation, approval, design and execution of ECC building projects constitute complicated systematic processes. 馆舍建设项目虽一般规模不大,其立项、设计和施工全过程管理也是一项复杂的系统工程。
9
Motorola's ECC business brings complementary technology with Emerson Network Power's embedded computing and embedded power businesses. 摩托罗拉的ECC业务部为爱默生网络能源部的嵌入式计算与嵌入式能源业务带来补充技术。
10
Both two Generic countermeasures can be transplanted to the scalar multiplication of ECC. 两种防御措施具有通用性,可移植到ecc中的标量乘法运算中去。
11
Provide validation expertise as a member of various ECC teams; develop &execute validation strategy via DVP &R. 作为ECC成员,提供专业的测试验证的技能,通过DVP&R发展和执行测试验证规划。
12
The ability to vary the field size is especially useful due to the need to implement all the curves selected by NIST in ECC applications . 由于需要实施NIST在ECC应用程序中选择的所有曲线,因此改变域大小的能力变得特别有用。
13
DSA and ECC algorithm performances are completely unacceptable in their current implementations. DSA和ECC算法性能在其当前实现中是完全不可接受的。
14
A verifiable vector space secret sharing scheme is proposed, whose security relies on the security of Elliptic Curve Cryptography (ECC). 提出了一种可验证的矢量空间密钥共享方案,其安全性依赖于椭圆曲线密码的安全性。
15
ECC- based traitor tracing scheme is constructed with an error correcting code. 基于纠错码的叛逆者追踪模型是通过纠错码来构造的。
16
Thus, the implementation of advanced ECC algorithm brings great challenge to the designing of embedded processor. 因此高级ECC算法的实现对于嵌入式处理器在设计方面构成了很大的挑战。
17
ECC member Fahim Hakim tells VOA that looking into these alleged electoral abuses could be time consuming. 选举投诉委员成员法希姆.哈基姆对美国之音说,对这些投诉一一进行调查可能要花很多时间。
18
The finite field arithmetic, elliptic curve cryptography (ECC) and the finite field multiplier are investigated in this thesis. 本论文研究的主要内容是有限域算术、椭圆曲线加密算法和有限域乘法器。
19
Theoretically and practically, the paper proved the feasibility of EAP-TLS and ECC Algorithm in improving the security of WLAN. 从理论和实践上验证了EAP-TLS认证技术和椭圆曲线密钥算法对增强无线局域网安全性的可行性和实用性。
20
The multi-scalar multiplication with two scalars is the most time consuming operations in elliptic curve cryptography(ECC). 在现代密码系统中使用椭圆曲线密码(ECC)最频繁的一种方法是多点乘算法。
21
Diplomats said Mr Karzai had been putting pressure on them to reject the ECC's order. 外交官们表示,卡尔扎伊已经对他们施加压力,要求他们拒绝选举投诉委员会的命令。
22
Today, smart cards have been widely used, while various attacks against ECC also come up. 如今智能卡已得到广泛应用,而各种针对ECC的攻击手段也随之而来。
23
Error Correcting Code (ECC) Checksum enables the correction of single-bit errors in database pages (in the. Edb file). 通过纠错码(ECC)校验和,可以纠正(.edb文件中)数据库页中的单个位错误。
24
Dr. Vanstone's commitment to exploiting ECC to develop stronger, more efficient security solutions extends to the entire Certicom team. Vanstone博士致力于利用ECC开发更为强大、更为有效的安全解决方案的理念如今已充盈整个Certicom团队。
25
But it only did so against stiff opposition from Mr Karzai and the Independent Election Commission (IEC). 但是ECC这样做,是同卡尔扎伊以及独立选举委员会(IEC)为敌。
26
In other designs, other parts of the memory device, such as the state machine, can calculate the ECC. 在其它设计中,存储器装置的其它部分(例如状态机)可计算ECC。
27
But considering the trend of cryptography in recent years, ECC and HCC will be the biggest winner in the cryptography field. 但是,从近几年密码学领域发展的情况来看,ECC和HCC必将是未来密码学领域应用的最佳选择。
28
Every connection has an attribute (active, idle, killed ecc) that tells you if there is activity on this connection. 每一个连接的属性(活跃,投闲置散,死亡ECC的),告诉您如果有活动就这方面。
29
The results show that the proposed design can meet our prospective requirements of ECC. 通过验证结果和系统仿真结果显示该实现方法满足预期的设计要求。
30
ECC encryption and FIPS- certified encryption require a separate license . ECC加密和FIPS认证的加密需要单独的许可。