英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The pupose of the research is to develops public key encryption and digital signature shemes based on matrix canonical decomposition problem, or matrix diagonalization problem over Z/n, the ring of integers with modulo-n addition and multiplication in particular, where n is an RSA modulus.

本课题研究基于矩阵经典分解问题,特别是Z/n上矩阵对角化问题的公钥密码与数字签名算法,其中n是一个RSA模数。新算法采用由一个矩阵多项式构成的多维单向陷门函数,其单向性由矩阵对角分解问题(即通过相似变换将矩阵化为对角型的问题)的复杂性来保障,对该函数求逆的陷门由矩阵的特征值或特征向量提供。

Understanding of the data encryption methods used by the Angel Cartel and its allies.

关于天使企业和他的盟友使用的数据密码技术方法的理解

Castanet's next version promises additional security, with password access and encryption.

下一版本的castanet将通过口令访问和加密增加安全性。

A symmetric image encryption algorithm that has a 128 bit key was proposed based on cellular neural network and coupled map lattice model.

基于细胞神经网络和耦合映像格子模型,提出了一种密钥长度为128 bit的对称图像加密算法。

Because of its cost-effective encryption and authentication framework, TESLA protocol is to be in line with the characteristic and security needs of wireless sensor networks to some extent.

TESLA协议凭借其低成本高效率的加密技术和认证框架,在一定程度上符合了无线传感器网络的特点和安全需求。

If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.

如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。

In this paper, we use a light-weight encryption scheme called Privacy Homomorphism that supports operations over ciphertext for our purpose.

因此在这篇论文中,我们利用了轻量化的加密演算法且能提供在密文上做资料计算的方法Privacy Homomorphism来达成我们的目标。

"Data encryption: Process of disguising information as " ciphertext ,"or data that will be unintelligible to an unauthorized person."

资料加密:将信息伪装成密码文件或使未经许可的人无法识别的资料的方法。

Based on the current stage of network data security is not an ideal situation, using advanced encryption algorithm and ciphertext REQUEST primer mechanism for the security of the data design.

本文基于现阶段网络数据安全并不理想的情况下,采用了先进的加密算法以及密文索机制引进行了数据安全设计。

Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.

它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。

第11/60页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
相关中文对照歌词
Headless Princess
Self Explanatory
No Church In The Wild
推荐网络例句

Putt your way through 36 fun-filled holes of minigolf on 3D designed courses with elevated greens, bunkers, bridges and water hazards, among other crazy obstacles.

您的推杆方式,通过36个有趣的填孔迷你的三维设计的课程,以提升绿党,掩体,桥梁和水的危害,除其他疯狂的障碍。

Some participles can be used either as attributes or as predicatives.

有些分词既可当定语用,也可当表语用。

Over time, the jaw crusher has been a significant improvement, it is a highly efficient, energy-efficient equipment often broken.

随着时间的推移,颚式破碎机得到很大的改进,已经是一种高效,节能的常用破碎设备。