computational security造句
例句與造句
- The first such flavour is whether the commitment scheme provides perfect or computational security with respect to the hiding or binding properties.
- For schemes based on computational security, the adversary is modeled by a probabilistic polynomial time Turing machine, meaning that it must complete the game and output a " guess " within a polynomial number of time steps.
- In light of this, and the practical difficulty of managing such long keys, modern cryptographic practice has discarded the notion of perfect secrecy as a requirement for encryption, and instead focuses on " computational security ", under which the computational requirements of breaking an encrypted text must be infeasible for an attacker.
- The first are those designed with the intent to protect against hackers and attackers who have infinite resources with which to decode a message ( theoretical secrecy, now unconditional security ), and the second are those designed to protect against hackers and attacks with finite resources with which to decode a message ( practical secrecy, now computational security ).
- It's difficult to find computational security in a sentence. 用computational security造句挺難的