加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The localfile is encrypted using the Blowfish algorithm, and you can edit information in a spreadsheet-likelayout.
本地文件被加密使用 Blowfish 算法,和你能够在似电子数据表的规划中编辑信息。
-
Can use blowfish algorithm to securely encrypt files.
可以使用算法安全加密文件。
-
Above is an example, this could also be twofish , blowfish or anything other crypto module that you would like to use.
上面只是个范例,它有可能会是 twofish、blowfish或其他任何可能的加密模组,依照你的喜好去使用。
-
You may have selected an NT encrypted password in the phone book entry.
你可能选择了加密口令,请使用明文或可被器接受的口令方式。
-
Bent function is a class of the highest nonlinearity Boolean function, and Boolean function is the key in the cipher system.
Bent函数是一类具有最高非线性度的布尔函数,布尔函数是对称加密密码体制设计和分析的关键。
-
Second, in the viewpoint of crypto analysis, the practical requirement for the cryptographic function is to construct the function that can resist all the known crypto analysis and attacks. In advanced, the main cryptographic properties are compared, and the relation among these cryptographic properties is analyzed, including the trade-off ones. Get the conclusion that the construction of cryptographic Boolean function is to find out the proper Boolean function in the whole vector space under the restriction of several cryptographic properties required for the security system.
然后本文从密码分析的角度,讨论了密码函数的实际需求,即构造能够抵抗已有密码分析与攻击的布尔函数;分析了布尔函数的主要的密码学性质,并比较了这些性质之间的相互关系,包括制约的关系;得出了构造布尔函数的实质的结论,即在向量空间中构造全体布尔函数,以所需的若干密码学性质作为限制条件,用有限域上的多项式、Walsh谱、Hadamard矩阵等数学工具找出适当的布尔函数用于加密体制的设计。
-
Any way you still have unencrypted partition to boot from.
你始终可以从非加密的分区启动。
-
Because we want the system to be bootable even without the encrypted partition mounted.
因为我们希望在加密后的分区不加载的情况下也可以引导此系统。
-
By taking advantage of the non-conjugate transformation and multiple variant equations on braid group s, two intractable problems are proposed, and the hardness of these problems comes from the enlarged amount of va.
辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,辫子群上已知的用于公钥密码系统的一些难解问题和基于这些难解问题的公钥加密算法都受到不同程度的攻击。
-
It used Sharmir Threshold Schemes to break up the encryption key and hide them in the encrypted bytecode file.
该方法利用Shamir门限分存方案,将加密密钥打散,隐藏在加密的Java字节码文件中。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。