繁體版 English
登录 注册

量子密码

"量子密码"的翻译和解释

例句与用法

  • In this work , we review these processes first and then build a software that uses internet as public channel to perform these post - processing . with this software we can carry out the post - processing in qkd and simulate the overall quantum encryption process
    本文论述量子密码中经典通道的通讯过程,并建立一个用internet作为经典通道的量子通讯软件,用这个软件可以实现经典通道的处理和模拟整个量子通讯的过程。
  • " quantum information . " physics world . ( march 1998 ) : 35 - 57 . some popular articles covering various aspects of quantum information , including quantum communication , quantum cryptography , quantum computing , and some possible ways of implementing the ideas
    量子信息> , 《物理世界》杂志1998年3月号35 ? 57页其中有很多有名的文章,介绍了有关量子信息的许多东西其中包括:量子通信,量子密码,量子计算以及与之相关的改进方法。
  • In addition , the existence of quantum non - cloning theorem leads to the birth of quantum cryptograph . in principal , quantum cryptograph can provide perfect secure and unattacked secret communication system , which is guaranteed by the law of quantum mechanics
    又如,在量子信息学中因为存在量子不可克隆定理,从而诞生了量子密码学,它原则上能够提供不可破译、不可窃听的保密通信体系,其安全性由量子力学基本原理所保证。
  • It is simulated that the reverse reconciliation gaussian - moduled quantum key distributed protocol ( abr . to rr ) in this paper . gaussian random modulation and public discussion are involved , which realized by software and hardware technology
    本文对reversereconciliationgauss - moduled量子密码分发协议(简称rr协议)进行了模拟,用软硬件相结合的方法实现了协议中关于高斯随机调制和公共信道讨论等过程,建立了点对点的传输系统。
  • Finally , the two aspects of the practical application of the quantum technology is introduced in this paper . one is application in the cryptanalysis , the other is some practical applications of quantum theory in information technology such as communication , security and etc
    最后,本文介绍了量子密码技术实际应用的两个方面,一个是密码攻击方面的应用,另一个则是讨论了量子理论在通信、安全等信息技术方面的一些实际应用。
  • Having known well on the study of the current situation about quantum cryptographic key , the rr quantum cryptographic key distribution protocol is concerned in this paper . the protocol includes the preparation of the secret - key 、 the eavesdropper detection 、 secret - key correction and privacy amplification
    在深入调查量子密码研究现状的基础上,本文针对rr协议进行了分析与研究,主要包括密钥制备、窃听者检测、数据纠错以及隐私放大等过程的实现方法。
  • In this paper , the application of spin chain in the quantum information processing is introduced , including the application in quantum cryptography , teleportation and quantum computation . spin chain can be used as quantum channel to transport quantum state , and can also be used to realize general quantum gate
    介绍了自旋链在量子信息过程中的应用,包括在量子密码和隐形传输中以及量子计算中的应用,自旋链可以充当量子通道用来传输量子态,自旋链也可以用来实现量子通用门。
  • Quantum communication is a rising interdisciplinary field which combines classical communication and quantum mechanics . quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution , especially which is the realism significance of research way in quantum information at present
    量子密码术是经典通信和量子物理相结合的一门新兴交叉科学。量子密钥分配( qkd )协议利用单光子固有的量子随机性实现具有无条件安全性的密钥分配,是目前量子信息领域中特别具有现实意义的研究方向。
  • Furthermore , some novel cryptography technology such as chaotic cryptography , quota cryptography are paid much attention by researchers beside conventional cryptography . in this paper , we propose a new chaotic searching simulated annealing method based on chaotic cryptography and intelligent computing to obtain cryptographically strong s - boxes
    在传统的利用代数方法设计密码学的基础上,一些新兴的密码学理论,如混沌密码学、量子密码学等等也引起了愈来愈多的学者的青睐。
  • 更多例句:  1  2  3
用"量子密码"造句  
英语→汉语 汉语→英语