密码
- 基本解释 (translations)
- cipher · code · codes · cryptogram · cryptograph · password · steganogram · ciphered · ciphers · passwords
- 词组短语
- cipher code · Secretul cifrului
- 更多网络例句与密码相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The information security technique will gradually acta highly anticipated role in the development of the network technology.
由于信息安全技术的支撑点是现代密码技术,而现代密码技术的核心是各种密码算法,因此,专用密码算法芯片在信息安全技术中起着至关重要的作用,信息安全技术发展到今天也被称为已经进入了芯片密码年代。
-
Second, in the viewpoint of crypto analysis, the practical requirement for the cryptographic function is to construct the function that can resist all the known crypto analysis and attacks. In advanced, the main cryptographic properties are compared, and the relation among these cryptographic properties is analyzed, including the trade-off ones. Get the conclusion that the construction of cryptographic Boolean function is to find out the proper Boolean function in the whole vector space under the restriction of several cryptographic properties required for the security system.
然后本文从密码分析的角度,讨论了密码函数的实际需求,即构造能够抵抗已有密码分析与攻击的布尔函数;分析了布尔函数的主要的密码学性质,并比较了这些性质之间的相互关系,包括制约的关系;得出了构造布尔函数的实质的结论,即在向量空间中构造全体布尔函数,以所需的若干密码学性质作为限制条件,用有限域上的多项式、Walsh谱、Hadamard矩阵等数学工具找出适当的布尔函数用于加密体制的设计。
-
First of all, the installation of EMF, generated during the installation process a password set operation to insert the disc, EMF detection site on the password, and enter the corresponding account, and then run the program to Magic.exe enter your password, this password is entered after EMF password.
首先安装EMF,在安装过程中生成一张密码盘,操作时插入该盘,EMF检测盘上的密码,并进入相应的账号,然后运行Magic.exe程序会要你输入密码,这个密码就是以后进入EMF的密码。
-
A short list of features include: Multiple user account capability, Drag and drop operation for insertion of user name and password, Printing function for hard copy of passwords, Password protected database functionality, Internal security features to help maintain privacy from "over the shoulder" intrusion using our -Hide/Show password function, Descriptive titles allowing the same username to be used repeatedly, Configurable random password generation, Memo section for noting important info about password, like inception date, expiration date or special site instructions, Method of storing and launching relative URL information for quick access to the web site the particular password might pertain, Ability to disable Splash screen after registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files.
短名单的功能包括:多用户帐户的能力,拖放操作插入的用户名和密码,打印功能,为的硬拷贝密码,密码保护数据库的功能,内部的安全功能,以协助维持隐私,从"肩膀"入侵使用我们的-hide/show密码功能,描述性的标题,让相同的用户名被反复使用,可配置的随机密码的一代,备忘录节注意到重要的信息密码,如成立日期,到期日或特别的指示,网站的方法,储存和开展相对网址的资料,以便快速存取该网站的特定密码,可能涉及,有能力,要禁用初始屏幕上注册后,可配置的超时功能,为无人值守程序锁起来,有能力复制的用户名和密码到剪贴板没有进入特定的纪录,能力要清除剪贴板从内部程序后,程序退出,全面计划,帮助文件。
-
Using the theories of probability, algebra, logical function in cryptology and spectral theory comprehensively, the dissertation investigates the properties and constructions of orthomorphic permutations, omni-direction permutations, quick trickle permutations and generalized orthomorphic permutations.
分组密码是现代密码学中一个重要的研究分支,而置换理论在分组密码中占有重要的地位,任何没有信息扩张的密码体制都可以看作是置换的结果,如数据加密标准DES可以看作是明文在密钥控制下的置换,公钥密码体制RSA可以看作是一种多项式置换,因此,研究置换的有关性质和构造具有重要的理论意义和应用价值。
-
This invention provides a method for transferring third party landing based on IP network including: a door network station carries a ciphered KEY generated randomly by a service server to send a link request to a third party network station so as to avoid transmission of user ciphered codes and ensure absolute security of user codes, besides, since the third party network station calls back the Web server by copying the ciphered KEY to verify the cryptographic key so as to secure the absolute safety of shaking hands, since the door network station does not transfer user ciphered codes with the third party network station, which is not necessary to synchronize with the door station about codes, thus the requirement of complicated maintenance to synchronization on ciphered codes to the third party is reduced.
本发明提供了一种基于IP网络转接第三方登陆的方法,其关键是,由门户网站携带业务服务器随机生成的加密KEY向第三方网站发送链接请求,避免了用户密码的传输,因而保证了用户密码的绝对安全性。再有,由于第三方网站通过复制加密KEY回调Web服务器,由Web服务器进行密钥验证,因而又保证了握手的绝对安全性。应用本发明,由于门户网站与第三方网站之间不传递用户密码,使得第三方网站无需与门户网站进行密码同步等机制的处理,在大大提高安全性的同时,降低了对第三方网站对于密码同步机制等复杂维护的要求。
-
This paper first analyses and summarizes the ststus quo and evolution trend of encryption, some common used cryptograph are introduced, including the algorithms used in symmetric cryptosystem and asymmetirc cryptosystem. We describe the theory of each algorithms and compare the elliptic curve cryptosystem with the other two asymmetric cryptosystems to show the advantages of this algorithm. Second, the principle of ECC is discussed, including the math foundation of ECC, basic conception of elliptic curves, constructiong idea of ECC, operation on the elliptic curve and so on. Third, the current attacks of ECC were analyzed deeply, and an algorithm based on limited prime number field was constructed. We analyzed its realizability in theory, and implement it by using certain function of MIRACL software package. Latter half in this paper, the implementation model of a simple elliptic curve encryption system which based on GF has been introduced. The paper also put a deep analysis on the algorithm of point addition and point multiplication.
本文首先对密码技术的发展现状及其发展趋势进行了分析和综述,详细的介绍了私钥密码系统和公钥密码系统的发展,说明各种算法的原理和优缺点,并给出了一些典型的密码体制的简要分析,重点将椭圆曲线算法与其它几种公钥密码算法比较,说明椭圆曲线算法的优势;其次,探讨了椭圆曲线密码体制的原理,包括椭圆曲线密码的数学基础、基本概念、椭圆曲线密码体制的构造思想等问题;第三作者对椭圆曲线的攻击现状作了详细的分析,针对所使用的大素数域F_p,设计了素数域上安全椭圆曲线产生的算法,从理论上做了可实施性分析,从软件上做了具体实现;在本文的后半部分,提出了一个简单的基于有限素数域上的椭圆曲线加密方按算实现模型,并对SECES中设计的点加和点乘运算进行了深入分析。
-
The average percent value of G C (49.3%) was less than that of A T (50.7%), there was a bias of the content of G, T in the third codon; The number of transition G-A and T-C were 22, 15 respectively, which were higher than that of transition A-G and C-T, the number of tranversion C-A, T-G is 2 respectively, and other tranversion patterns didnt occur; the probability of transition was higher than that of tranversion , Ts/Tv = 9.5-19, there was the highest number of transition in the third codon. The gamma parameter a of the lst,nd and 3rd codon positions were 0.00572,0.01237 and 1.05239 respectively, they showed that there was adifferent substitution rate at different codon position. Frequences of synonymous codon usage were relatively biased. The average rates of synonymous and nonsynonymous substitution were 0.0787, 0.0011 respectively, there was a significant difference between dS and dN (Z = 4.713, p.01), and the low ratio( CD = 0.0284 .3) of dN/dS ratio impled that there were selective constraints against the nonsynonymous sites in cyt-b gene, The distribution of nonsynonymous codon substitution pattern related to Grantharm distance indicated that the purified selection at 2nd codon positions was more intensive than that at 1st codon positions. The phylogenetic trees supported the view of the double origin of Chinese goose, which means that domestic Chinese goose was derived from Anser cygnoides and domestic European goose, and Yili was derived from Anser anser.
碱基含量分析可知,序列的G C含量(49.3%)<A T含量(50.7%),密码子第三位点的G、T含量都有较强的偏倚性;序列间G→A和T→C的转换数(22次和15次)高于A→G和C→T的转换数(10次和9次),C→A、T→G颠换数均为2次,其余颠换模式均未发生;转换数明显高于颠换数,Ts/Tv=9.5~19,密码子第三位点的转换数最高,呈现了相当强烈的转换偏倚性;密码子第一、二和三位点的gamma分布参数α值分别为0.00572、0.01237和1.05239,表明密码子第一位点的替换速率变异最大,第二位点次之,第三位点的替换速率变异相对较小;编码同一氨基酸的同义密码子并非随机使用,表现出一定程度的使用偏倚性;同义替换速率和非同义替换速率分别为0.0787和0.0011,dS与dN值间的差异极显著(Z=4.713,p<0.01),而ω=0.0284,明显小于0.3,表明雁属鹅细胞色素b基因序列经历了中度净化选择作用;单步非同义替换(Sing-step nonsymonymous codon substitution,SSNCS)分布模式与Grantharm距离之间的关系说明密码子的三个位点所受的净化选择强度不同;构建的最大简约树与邻接树拓扑结构一致,支持中国家鹅的双起源学说,即除伊犁鹅外的其它中国鹅品种起源于鸿雁,伊犁鹅和欧洲的郎德鹅、莱茵鹅起源于灰雁。
-
To change your Pin, please browse the Library webpage at http://library.cfhc.caritas.edu.hk and select " Online Catalogue ". Click on the " Change Password " button and enter your Patron Barcode, the original Pin and the new Pin. Then, key in your new Pin in the Confirmation Pin box to confirm and select the " OK " button to exit from your record.
如欲更改密码,请先进入图书馆首页 http://library.cfhc.caritas.edu.hk ,按顺序点选&线上目录&→&更改密码&,请输入您的读者条码,预设密码和新密码,然后在&确认密码&框再输入一次新密码以作确认,并按&确定&退出读者记录。
-
Rule 3 - Password Scamming 规定 3-密码骗局 Asking for another players password for any reason will not be tolerated.
对于任何的理由欺骗另外的一个玩家密码的将不会被宽容。
- 更多网络解释与密码相关的网络解释 [注:此内容来源于网络,仅供参考]
-
Change Password:改变密码
要设置一个启动密码,选择使用启动装载器密码(Use a boot loader password)检测框,这时改变密码(Change password)按钮会被激活. 选择改变密码按钮来显示一个条目对话框. 输入想要的密码,然后通过再次输入一次进行确认.
-
cryptanalysis:密码分析学
(4) 密码分析学(Cryptanalysis):泛指(5) 如何破解密码系统,(6) 或伪造信息使密码系统误以为真的科学. 一个密码系统的主角有3个人,即发送方,接受方与破译者,典型的密码系统如下图所示: 一般而言,
-
cryptanalyst:密码破译者密码专家
cryptanalysis | 密码分析学, 密码翻译法 | cryptanalyst | 密码破译者密码专家 | cryptanalyze | 用密码分析法破译
-
cryptograph:密码,密码打字机
"密码电文","cryptogram" | "密码,密码打字机","cryptograph" | "密码演算法","cryptographic algorithm"
-
denied:拒绝-系统密码修改或删除无须管理员密码
Password Changes Permitted 许可-修改或删除系统密码需要有效的管理员密码 | Denied 拒绝-系统密码修改或删除无须管理员密码 | Default setting: Premitted 默认:许可
-
ena sec:密码 配置密文密码
enable password +密码 配置明文密码 | ena sec +密码 配置密文密码 | password +密码 配置telnet密码
-
password hint:密码提示,供以后忘记密码,想起自己的密码用
password 密码 | Password hint 密码提示,供以后忘记密码,想起自己的密码用 | Country: 国家
-
New Password:密码
在 新密码 (New Password) 资料栏内,输入新密码. 在 确认密码 (Confirm Password) 资料栏内再输入一次,以确认密码. 在 密码提示资讯 (password hint message) 资料栏内,输入密码提示资讯. 如果您收到升级韧体的指示,
-
npasswd UNIX:的一种代理密码检查器,在提交给密码文件前,它将对潜在的密码进行筛选
node 节点 | npasswd UNIX的一种代理密码检查器,在提交给密码文件前,它将对潜在的密码进行筛选. | OSPF 开放最短路径优先协议
-
npasswd UNIX:的一种代理密码检查器,在提交给密码文件前,他将对潜在的密码进行筛选
node 节点 | npasswd UNIX的一种代理密码检查器,在提交给密码文件前,他将对潜在的密码进行筛选. | OSI Model 开放系统互连模式