英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.

它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。

The method of DPA may attack on encrypted FPGA effectively,which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

差分功率分析方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。

Files and folders are encrypted with a strong encryption algorithm, using a combination of a unique user key and the password.

文件和文件夹加密与一个强大的加密算法,使用相结合的一个独特的用户的关键和密码。

These articles can be imported from documents of various formats such as TXT, RTF, DOC, HTM, MHT, SWF, GIF, JPG or PDF files, captured from the clipboard or copied from selected IE content. E-Stack Room offers a combination of features like tree-type organization, rich text editor and secure encryption.

这些项目可以从文档中导出为诸如:TXT, RTF, DOC, HTM, MHT, SWF, GIF,JPG或者PDF格式的文件,可以扑获剪贴板上的内容或者拷贝选取的IE浏览器上的内容。E-Stack Room提供类似树形结构、富文本编辑器以及安全加密这些综合功能。

Since the publication in 1977, has been the international commercial lunwen114confidentiality of communications and computer communications of the most commonly used encryption standard.

自从1977年公布以来,一直是国际上的商用保密通信和计算机通信的最常用的加密标准。

Greatest Common Divisor is one of the basic subjects in computational number theory, it has a wide application in encryption and analysis of cryptography.

摘要最大公因子计算是计算数论的基础课题之1,它在密码算法和密码分析中有着非常广泛的应用。

In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.

本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。

If there is an encryption computer virus, what will happen?

如果有一种加密计算机病毒,将会怎样?

Image scrambling based on coordinate transformation was a kind of image encryption technologies.

基于坐标变换的图像置乱是一种图像加密技术。

This one, made by Cylink, contains a coprocessor specifically designed to handle public-key encryption mathematics.

这个是Cylink做的,内装一个特别设计来处理公钥加密算法的协处理器。

第12/60页 首页 < ... 8 9 10 11 12 13 14 15 16 ... > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。