查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It provides 256-bitAES encryption to protect your data and keep it safe from prying eyes.
提供 256 位的 AES 编密码保护你的数据,保持它安全。
-
Chaos; Combined chaotic map; Infinite dimension pseudo random number; Image encryption; Statistical features
混沌;组合混沌映射;无穷维伪随机数;统计特征;图像加密
-
In the design of SMCOS, introduce the software and hardware developing platform of SMCOS at first, then describe the system characteristic and hierarchical structure, tell the course of design and implementation of the software system of the SMCOS finally, mainly tell software architecture, design method to command interpreter, transmission module and file management, especially carry on deep explanation and discussion to the security environmental management of SMCOS, design the secure pseudorandom number generator according to systemic characteristic; Implement AES cryptographic algorithm, and optimize in term of the characteristics of AVR platform, make it reach the faster speed of encryption in case
在SMCOS的设计中,首先介绍了SMCOS的软硬件开发平台,然后描述了系统特性及其层次结构,最后讲述了SMCOS的软件系统设计与实现过程,主要讲述了SMCOS的软件架构、命令解释器、传输模块以及文件管理器的设计方法,特别对于SMCOS的安全环境管理进行深入的讲解及探讨,针对系统特点设计了安全的伪随机数生成方法;实现了AES加密服务模块,并针对AVR平台的特点进行了优化,使其在占用较小的代码空间的情况下达到较快的加密速度;改进了PIN的认证方法,对其传输过程提供了安全保护并采用了安全的验证方式以避免可能遭受的攻击:设计了相互认证命令,缩减了认证过程的时间消耗并提高了安全性。
-
Pure C code, to achieve encryption algorithm can run in Single Chip.
详细说明:纯C代码,实现加密算法,可以跑在单片机上。
-
The main difference between that and double encryption is the presence of a fixed random sequence.
二者的主要区别,以及双加密是存在一个固定的随机序列。
-
Their own to do a certain length of characters will be converted to random sequence of procedures, the feeling of the encryption and decryption of some help.
详细说明:自己做的一个将一定长度的字符转换为随机序列的程序,感觉对加密解密有些帮助。
-
Compared with the traditional "signature then encryption scheme",the cipher text of our scheme is rathe...
与传统的先签名后加密的方案相比,本方案中密文长度有了明显的降低,在低带宽的要求下更加可行。
-
"At the same time, our own client base is very interested in the security and encryption, digital signatures, forms, redaction and other technologies that are longtime specialties for ADS," he adds.
"与此同时,我们自己的客户群是非常有兴趣的安全和加密,数字签名,表格,稿本,并针对广告设计等专业技术的长期,"他补充说。
-
Fast Public-Key Encryption Scheme Based on the Chinese Remainder Theorem[J].
基于中国剩余定理的快速公钥加密算法[J]。
-
It turns out that the modulus of the RSA cryptosystem is easy to factor if the the ratio of the two prime factors of the modulus can be well approximated by a small fraction.(3) A fast public-key encryption scheme is developed by using the Chinese remainder theorem.
2找到了RSA公钥密码算法的一类弱密钥,指出如果RSA数的两个素因子的比值能够被一个小分数有效逼近的话,则RSA数是容易分解的。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。