查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Three kinds of encryption methods——Arnold scrambling, magic square scrambling and chaotic technique are introduced in detail.
秘密信息嵌入在这些高能量的音频段后,提高了该算法的鲁棒性和不可见性。
-
Which also includes analysis of the majority of characters function, encryption and decryption functions.
其中还包含了大部分字符分析函数,加密解密函数。
-
This is incredibly easy (and a good example of why you should use the device mapper for encryption in ubuntu and stop using the old loopback system).
此步骤不可置信的容易(这也是一个好例子说明你应该使用ubuntu中的device mapper来加密而不是使用旧的环回系统)。
-
We also describe that it exists the coefficients matrix of the MixColumn operation in Rijndael which satisfy that the encryption and decryption can share the same operation.
4从改变Rijndael的变换常量这一全新的角度降低了其实现的代价,包括软件和硬件的实现代价,尤其是硬件实现代价。
-
It only takes quadratic bit complexity for the cryptosystem to perform an encryption/decryption operation.(6) A public-key cryptosystem is proposed by using a special combinatorial problem defined over the matrix ring. The security of the scheme is related to but not directly dependent upon the integer factorization problem.
6使用矩阵环上的一个特殊的组合问题构造了一个公钥加密算法,其安全性与整数分解问题有关,但并不直接依赖于整数分解问题,而是依赖于一类特殊的矩阵组合问题。
-
Best of all, data encryption velocity is about 50-60 Mbps in our nation.
国内最快的数据加解密的速度也就是五、六十兆的水平。
-
Here is the meat and potatoes of the encryption/decryption process.
这里是肉和土豆的加密/解密过程。
-
The security verification based on the content authentication is implemented through feature extraction, choosing of the shared encryption key, transformation of the Hash function and generation of the Merkle tree, which is simulated in the environment of NS-2. The result shows that the proposed mechanism has better performance in the efficiency and security.
通过特征提取、选取共享密钥、Hash函数变换和构造Merkle树实现基于内容认证的安全性检验,并在NS-2环境下进行了仿真模拟,结果表明所提出的安全机制具有较好的效率和安全性。
-
It should be noted, though, that, if it is assumed that the first layer of encryption, since it is shared among all the nodes in the network, can be compromised, then the fact that the keypad numbers are not further concealed does weaken this system: for each value tried in a brute-force search of the key for a message block, the related keypad is immediately identifiable.
应当指出,虽然说,如果这是假设的第一层加密,因为这是共同的各节点在网络中,可以毫不妥协的,那么事实,那就是键盘号码,不准备再隐瞒不削弱本制度:每个价值试图在一个简单粗暴的武力搜索最关键的一个消息块时,其相关按键立即识别。
-
The encryption algorithms ensure the security of message transfer, which among the clients and the authentication servers.
其中,最常用的就是对称加密算法和公钥加密算法,加密算法可以保证用户和认证服务器间的数据传输保密和安全。
- 推荐网络例句
-
It has been put forward that there exists single Ball point and double Ball points on the symmetrical connecting-rod curves of equilateral mechanisms.
从鲍尔点的形成原理出发,分析对称连杆曲线上鲍尔点的产生条件,提出等边机构的对称连杆曲线上有单鲍尔点和双鲍尔点。
-
The factory affiliated to the Group primarily manufactures multiple-purpose pincers, baking kits, knives, scissors, kitchenware, gardening tools and beauty care kits as well as other hardware tools, the annual production value of which reaches US$ 30 million dollars.
集团所属工厂主要生产多用钳、烤具、刀具、剪刀、厨具、花园工具、美容套等五金产品,年生产总值3000万美元,产品价廉物美、选料上乘、质量保证,深受国内外客户的青睐
-
The eˉtiology of hemospermia is complicate,but almost of hemospermia are benign.
血精的原因很,以良性病变为主。