加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Consider both feature about streams encipher and elliptic curve encipher , encryption process would divided into two steps to carry out , brings up a fresher Triaxiality CA Stream Encipher Algorithms Use Ellipse Curve Cipher Key, analysed some significance natures about the fusion algorithm, and performanced the fusion algorithm.
结合二者的特点,将加密过程分为两个阶段进行,提出了一种新的加密算法—用椭圆曲线加密密钥的三维CA流加密算法;分析了该算法的一些重要性质,对该算法进行了实现工作。
-
Also known as asymmetric cryptography, solves the key exchange problem by defining an algorithm which uses two keys, each of which may be used to encrypt a message.
注释 :公钥加密也称为"非对称加密",它解决了 key 交换的问题,它使用两个不同的 key ,其中的任何一个都可以用于加密消息。
-
It is in common use that data encryption ensures networks security. The paper furthers its research on the Ethernet hardware encryption, and focuses on the study of the application of the IDEA algorithm in data link layer. Also the protocol of the secret keys'exchange based on the Diffie-Hellman algorithm is presented.
数据加密是保证网络安全的常用手段,本文接着研究了以太网硬件加密技术,重点研究了IDEA算法在链路加密中的应用,同时基于Diffie-Hellman算法设计了一种密钥交换协议。
-
Inpractical life, short-block encryption technology is widely applied, suchas pre-payment code-meter.
短分组加密技术是在实际应用中使用较多的一种加密技术,如预付费代码表计中使用的就是短分组加密技术。
-
In the meantime, we got several achievements during the process:Firstly, a sequence encryption algorithm of real-time video in use of one dimension piece-wise linear chaotic map is carried out. This algorithm makes use of Inter' s SSE2 special dictates and makes nonlinear change of chaotic sequences.As a result, the algorithm not only encrypts faster, but also resists several cipher analysis methods. Secondly, this paper presents a block encryption algorithm of real-time video based on chaotic neural network which makes use of numerical transient chaotic neural network to produce chaotic sequences and uses these sequences to do encryption.
同时,在实现系统的过程中,取得了以下研究成果:(1)提出了一种利用一维的分段线性混沌映射来对实时视频进行序列加密的算法,该算法利用Inter的SSE2专用指令集来实现,并对产生的混沌序列进行了有效的非线性变换,从而使该算法不仅加密速度快,并且能有效的抗多种密码分析;(2)提出了一种利用混沌神经网络对实时视频进行分组加密的算法。
-
The objective of this research is focusing on the printing halftone image on papers to make an experiment on data hiding and recognition to combine the data hiding technology with digital halftoning algorithms to produce data hiding in halftone image and to process the data recognition after optical retrieving of images.
本研究针对纸张上印刷过网图像进行加密与比对辨识实验,将资料加密技术结合数位过网演算法制作网点加密图像,并对图像进行光学撷取后再进行资料辨识。
-
The encryption algorithms ensure the security of message transfer, which among the clients and the authentication servers.
其中,最常用的就是对称加密算法和公钥加密算法,加密算法可以保证用户和认证服务器间的数据传输保密和安全。
-
There is a good username/password service at the KxS site which will allow you to enter the user name and password and will output it in the correct format.
"password"位置应该是加密过密码你可以通过几种方法来得到加密过密码:一是使用一个网上提供 permade脚本或自己写一个;另一个很不错 username/password加密服务是通过KxS网站,这里允许你输入用户名及密码,然后生成正确格式密码
-
PGP encourages consumer use of encryption -- the more use, the better for everyone in the business.
PGP鼓励用户使用加密技术——加密的人越多,对使用加密技术的人就越有利。
-
The IDEA algorithm is one kind of block data encryption algorithm, It has designed a series of encryptions turn of order, each turn of encryption all uses a sub- key which produces from the integrity encryption key.
IDEA算法是一种数据块加密算法,它设计了一系列加密轮次,每轮加密都使用从完整的加密密钥中生成的一个子密钥。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。