查询词典 a cipher
- 与 a cipher 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The cryptographer would break the cipher, the amateur would make a change to "fix" it, and the cryptographer would break it again.
密码学家攻破他的密码,他又会做些改变来"修正"它,密码学家又再次攻破它。
-
Based on these, we construct a class of nonlinear sequence generators, show that they have better cryptographical properties, and furthermore they can resist on the attack of cipher by cryptology analysis So they can be used as key sequence generators..
在此基础上自主设计了一类非线性序列生成器,证明了其具有良好的密码学性质,并且通过密码分析,表明它能抵抗现有的几种密码攻击,因此这类非线性序列适于做密钥流生成器。
-
Marian Adam Rejewski (help·info; 16 August 1905 – 13 February 1980 was a Polish mathematician and cryptologist who in 1932 solved the plugboard-equipped Enigma machine, the main cipher device used by Germany.
在进行这项工作期间,他从根本上发展了密码分析学。之前,密码分析方法利用自然语言中的模式与统计特性,例如字母的频率分析。然而雷耶夫斯基在他对Enigma密码的攻击中第一次应用了纯数学的方法。
-
It is the simplest cipher because it only allows one possible way to decode a word.
这是最简单的密码,因为它仅允许其中一个可行方法,解码一句话。
-
Based on the embedded system and cipher technology, a digital speech scrambler is designed and realized in this thesis which can security transmit speech, video, fax and data.
本文利用嵌入式系统技术和密码学技术,利用现有的PSTN或ISDN,采用先进的分组加密算法,设计实现了基于EPSON 33209 体系的数字语音保密电话,实现语音、视频、传真及数据的安全传输。
-
The zero-knowledge status authentication is a fascinating question of contemporary password research, and the elliptic curve is the cipher system having higher security in comparison with others.
零知识身份认证是当代密码研究的一个引人入胜的问题,而椭圆曲线相对于其它密码体制具有更高安全性。
-
Consider both feature about streams encipher and elliptic curve encipher , encryption process would divided into two steps to carry out , brings up a fresher Triaxiality CA Stream Encipher Algorithms Use Ellipse Curve Cipher Key, analysed some significance natures about the fusion algorithm, and performanced the fusion algorithm.
结合二者的特点,将加密过程分为两个阶段进行,提出了一种新的加密算法—用椭圆曲线加密密钥的三维CA流加密算法;分析了该算法的一些重要性质,对该算法进行了实现工作。
-
In order to find a good stream cipher algorithm as world standard for data encryption...
目前对ECRYPT候选流密码算法的分析和研究是流密码的一个研究热点。
-
This method implements a block cipher algorithm which has involutional structure by using module-based partial reconfiguration technology of Xilinx FPGA,and gives the solutions to the key technical issues such as cooperation between modules,communication channels design and timing adjusting scheme.
加密算法实现的对比实验验证了该方法的有效性。1引言可重构计算是当前计算机系统结构领域的发展趋势之一[1],它利用可重构逻辑器件的在线编程能力以硬连线逻辑高效地实现算法操作,在加解密、图像处理等领域有着重要应用。
-
Based on Stream Cipher proposed by HDCP, author of this paper designed a Stream Ci-pher IP, and verified the IP under MDK condition.
同时根据HDCP协议提出的流加密算法,设计了一个流加密IP,并对IP在MDK环境下进行了验证。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。