1.The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加算法的安全性很大程度上取决于暴力破解的不可行性。
2.Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加与公开钥方法结合起来,兼备了两者的优点。
3.Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步乱,对图像乱算法进行了改进,改进后的算法提升了混沌乱加速度,符合图像加的需要。
4.In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
6.RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.