The super scholar system becomes a scholar in one second
Chapter 2106 The diligent and thrifty academic master
Chapter 2106 The thrifty academic master
Everyone has heard about public key cryptography.
It's just that they have heard about it, but they haven't seen it with their own eyes. Many of them are far from being an unsolved mystery to today's computer industry.
And now, the inventor of public key cryptography has brought him to the public.
Once they were eager to know the public key cryptography technology, but when Martin Hellman wanted to analyze the public key cryptography technology on the spot, they were still shocked!
These words, like a whirlwind, swept over everyone's heads in an instant, shaking everyone's brains...
-
Under the stage, Qin Luo rubbed his ears to relieve the discomfort caused by the huge sound waves.
Of course, his discomfort didn't come from Martin Hellman. After all, he had expected Martin Hellman's subject, so he wasn't too surprised.
His discomfort came from the exclamation of the melon-eating audience around him.
Make it as loud as you want!
Emmmm, to be honest, are you so surprised?
Qin Luo has also heard about public key encryption.
Public key encryption, also known as asymmetric (key) encryption (public key encryption), belongs to the second-level discipline of network security under communication technology, which refers to a pair of unique keys (ie public key and private key). Composed encryption method.It solves the issue of key release and management, and is the core of current commercial encryption.In the public key encryption system, what is not disclosed is the plaintext, and what is disclosed is the ciphertext, public key, and algorithm.
His primary focus is in commerce, a technology that enables secure and efficient internet transactions and is often used to move trillions of dollars every day.
At the same time, it can be used for transaction encryption.
It can be said bluntly that Martin Hellman's invention adds a security lock to dangerous network payments.
Running every money in safe mode, Martin Hellman's contributions to computer network security are unparalleled.
From this point of view, even Qin Luo has to say admiration to Martin Hellman!
Of course, admiration belongs to admiration, but this does not prevent Qin Luo from winning the award.
As a member of the Huaxia academic circle, he will be responsible to the Huaxia academic circle.
Facing the first Turing Award trophy in China's history, Qin Luo couldn't just hand over the trophy because of admiration.
Thinking of this, Qin Luo silently glanced at the system panel.
He originally planned to use his knowledge to deal with this award.
However, the appearance of Martin Hellman put a lot of pressure on Qin Luo, so Qin Luo decided to change his plan and use the system.
Of course, this is not because Qin Luo is afraid, but because of the principle of rational use of resources.
Anyway, the system is placed there, isn't it a waste to use it...
Host: Qin Luo.
Mathematics lv7...
Chinese lv3...
English lv3...
History lv3...
Computer lv6...
Physical lv6...
"Proficient in: computer hacking technology, hydrogen energy extraction technology, hydrogen energy development technology, graphene extraction technology, nuclear fusion development technology, rocket propulsion manufacturing technology..."
(End of this chapter)
Everyone has heard about public key cryptography.
It's just that they have heard about it, but they haven't seen it with their own eyes. Many of them are far from being an unsolved mystery to today's computer industry.
And now, the inventor of public key cryptography has brought him to the public.
Once they were eager to know the public key cryptography technology, but when Martin Hellman wanted to analyze the public key cryptography technology on the spot, they were still shocked!
These words, like a whirlwind, swept over everyone's heads in an instant, shaking everyone's brains...
-
Under the stage, Qin Luo rubbed his ears to relieve the discomfort caused by the huge sound waves.
Of course, his discomfort didn't come from Martin Hellman. After all, he had expected Martin Hellman's subject, so he wasn't too surprised.
His discomfort came from the exclamation of the melon-eating audience around him.
Make it as loud as you want!
Emmmm, to be honest, are you so surprised?
Qin Luo has also heard about public key encryption.
Public key encryption, also known as asymmetric (key) encryption (public key encryption), belongs to the second-level discipline of network security under communication technology, which refers to a pair of unique keys (ie public key and private key). Composed encryption method.It solves the issue of key release and management, and is the core of current commercial encryption.In the public key encryption system, what is not disclosed is the plaintext, and what is disclosed is the ciphertext, public key, and algorithm.
His primary focus is in commerce, a technology that enables secure and efficient internet transactions and is often used to move trillions of dollars every day.
At the same time, it can be used for transaction encryption.
It can be said bluntly that Martin Hellman's invention adds a security lock to dangerous network payments.
Running every money in safe mode, Martin Hellman's contributions to computer network security are unparalleled.
From this point of view, even Qin Luo has to say admiration to Martin Hellman!
Of course, admiration belongs to admiration, but this does not prevent Qin Luo from winning the award.
As a member of the Huaxia academic circle, he will be responsible to the Huaxia academic circle.
Facing the first Turing Award trophy in China's history, Qin Luo couldn't just hand over the trophy because of admiration.
Thinking of this, Qin Luo silently glanced at the system panel.
He originally planned to use his knowledge to deal with this award.
However, the appearance of Martin Hellman put a lot of pressure on Qin Luo, so Qin Luo decided to change his plan and use the system.
Of course, this is not because Qin Luo is afraid, but because of the principle of rational use of resources.
Anyway, the system is placed there, isn't it a waste to use it...
Host: Qin Luo.
Mathematics lv7...
Chinese lv3...
English lv3...
History lv3...
Computer lv6...
Physical lv6...
"Proficient in: computer hacking technology, hydrogen energy extraction technology, hydrogen energy development technology, graphene extraction technology, nuclear fusion development technology, rocket propulsion manufacturing technology..."
(End of this chapter)
You'll Also Like
-
Traveled through time and space and became Sukuna, but the host was Yukinoshita?.
Chapter 202 5 hours ago -
The Return of the Great Emperor
Chapter 972 5 hours ago -
Martial Arts: Killing enemies will increase your power, my skills are overwhelming!
Chapter 285 5 hours ago -
Dark Fairy Tale: The Evil Queen Rolls Her Eyes at the Beginning
Chapter 128 5 hours ago -
I pretend to cultivate immortality in kindergarten.
Chapter 216 5 hours ago -
The Martial Saint who slays demons starts with refining insects
Chapter 195 5 hours ago -
Unknown Coming: I have an invincible domain
Chapter 477 5 hours ago -
I am writing a diary in a crossover manga.
Chapter 193 5 hours ago -
I asked you to be a mage, not to raise a nine-tailed fox.
Chapter 406 5 hours ago -
Taiping Inn
Chapter 2150 5 hours ago