英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The method of DPA may attack on encrypted FPGA effectively,which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

差分功率分析方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。

Files and folders are encrypted with a strong encryption algorithm, using a combination of a unique user key and the password.

文件和文件夹加密与一个强大的加密算法,使用相结合的一个独特的用户的关键和密码。

These articles can be imported from documents of various formats such as TXT, RTF, DOC, HTM, MHT, SWF, GIF, JPG or PDF files, captured from the clipboard or copied from selected IE content. E-Stack Room offers a combination of features like tree-type organization, rich text editor and secure encryption.

这些项目可以从文档中导出为诸如:TXT, RTF, DOC, HTM, MHT, SWF, GIF,JPG或者PDF格式的文件,可以扑获剪贴板上的内容或者拷贝选取的IE浏览器上的内容。E-Stack Room提供类似树形结构、富文本编辑器以及安全加密这些综合功能。

Since the publication in 1977, has been the international commercial lunwen114confidentiality of communications and computer communications of the most commonly used encryption standard.

自从1977年公布以来,一直是国际上的商用保密通信和计算机通信的最常用的加密标准。

Greatest Common Divisor is one of the basic subjects in computational number theory, it has a wide application in encryption and analysis of cryptography.

摘要最大公因子计算是计算数论的基础课题之1,它在密码算法和密码分析中有着非常广泛的应用。

In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.

本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。

If there is an encryption computer virus, what will happen?

如果有一种加密计算机病毒,将会怎样?

Image scrambling based on coordinate transformation was a kind of image encryption technologies.

基于坐标变换的图像置乱是一种图像加密技术。

This one, made by Cylink, contains a coprocessor specifically designed to handle public-key encryption mathematics.

这个是Cylink做的,内装一个特别设计来处理公钥加密算法的协处理器。

Finally, the way of the optical image encryption with chaotic sequence based on joint transform correlator is proposed.

最后,本文提出了利用混沌序列相位对图象在联合变换相关器中进行加解密的方法并作了计算机模拟分析。

第12/60页 首页 < ... 8 9 10 11 12 13 14 15 16 ... > 尾页
相关中文对照歌词
Headless Princess
Self Explanatory
No Church In The Wild
推荐网络例句

Salt is good, but if the salt becomes flat and tasteless, with what do you season it?

14:33 盐本是好的,盐若失了味,可用什么叫它再咸呢?

He reiterated that the PLA is an army of the people under the leadership of the Communist Party of China.

他重申,人民解放军是在中国共产党领导下的人民军队。

After five years at the Laue-Langevin Institute in Grenoble, France, Jolie turned his focus to experimental work when, in 1992, he accepted a position at the University of Fribourg in Switzerland.

他在法国格赫诺柏的劳厄–蓝吉分研究所工作了五年之后,1992年转往瑞士夫里堡大学从事实验研究。