| 1. | Tdea triple data encryption algorithm , implementation standard 三位数据加密算法 |
| 2. | Tdea triple data encryption algorithm modes of operation 三位数据加密算法 |
| 3. | Modification and application of frog data encryption algorithm 数据加密算法的改进与应用 |
| 4. | International data encryption algorithm 国际资料加密法则 |
| 5. | Data encryption algorithm 数据加密算法 |
| 6. | Encryption algorithm that can be used as a replacement for data encryption standard or international data encryption algorithm 用于替代数据加密标准或国际数据加密算法的加密方法。 |
| 7. | The formal description of the data encryption algorithm , developed by ibm and adopted by the u . s . government as a formal standard in 1977 由ibm开发的数据加密算法( data encryption algorithm )的正式描述, 1977年美国政府采用它作为正式的标准。 |
| 8. | The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail . this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm 文章最后分析了该密码系统的安全性,对椭圆曲线离散对数问题的难解性以及三重des加密算法的安全性作了较详细的分析。 |
| 9. | With the developing of information technology , the study of image processing and data encryption algorithms has been widely concerned , and how to make use of hardware to realize these algorithms becomes an important study aspect 随着信息技术的发展,图象处理和数据加密算法的研究受到人们的广泛关注,如何将算法硬件化成为一个重要的研究方向。 |
| 10. | And the unrelenting information leakage and network criminal set safety apart . it is an emergency mission for programmer to solve the problem . in this article some research and design upon above is done . the mathematic models of des & rsa are described which are data encryption algorithms with higher safety factor and their strongpoint and shortcoming are compared respectively 本文研究安全系数较高的des和rsa两种数据加密算法的数学模型以及各自的优缺点,并提出了基于以上两种算法复合应用的改进数据加密方法?组合加密方法,分析其可行性以及如何用程序进行改进方案实现。 |