加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By comparing the performance of RSA and ECC, the method on how to intercept the elliptic curves and howto code the Elliptic Curve Crytosystems was provided. Fast point multiplication on a family of Koblitz elliptic curves in characteristic 3 is considered.
第二部分首先深入研究了用于身份认证和密钥分发的公钥密码体制,对RSA和ECC的性能进行比较,对椭圆曲线的选取和椭圆曲线密码体制的加密、解密算法设计进行探讨。
-
The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.
这次竞赛的目的是为了寻找一个强大的替代品,来取代现有的散列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要差的加密性。
-
FanE『TransChina』 DOES NOT WARRANT OR MAKE ANY REPRESENTATIONS AS TO THE SECURITY OF THIS WEB SITE.
除非FanE『翻译中国』声明某个功能已被加密,FanE『翻译中国』不对本网站的安全性做任何保证或声明。
-
Some file systems, such as NTFS file system, support compression or encryption for individual files and directories.
一些文件系统,像NTFS文件系统,对于个别的文件或目录支持压缩或加密。
-
A different encryption method for testing and compression file compression under the speed and size of tool.
详细说明:一个用于测试不同加密方式及压缩方式下文件压缩的速度和大小的工具。
-
The Ultimate Toolbox contains some useful utilities for file encryption and compression, comparison, search and replace and more.
终极工具箱包含的文件加密和压缩,比较了一些有用的工具,搜索和替换等。
-
Design and implementation of the network management and security system based on professional packet filter are presented in this paper.
本文介绍了基于专业过滤器的网络管理与安全系统的设计和实现过程,该系统结合了包过滤、用户认证、计费和数据加密等多种技术。
-
In this dissertation, a new multimedia joint encryption and fingerprinting scheme embedded into the advanced access control system is proposed.
本论文中提出了一套结合式加密和多媒体指纹嵌入的方法,并且可以和 AACS相容。
-
Methods in discrete mathematics, such as finite difference equation, simulation, coding, etc. The related cases are "Mortgage loan and other financial problems","Simulation of inventory problem","Adding cipher and extricating for Hill code", and "Input-output analysis".
某些离散问题的数学方法(差分方程问题,仿真方法,密码学等),这部分内容相应的教学案例是"个人住房抵押贷款与其他金融问题","库存问题的仿真方法","Hill密码的加密、解密和破译"和"投入产出分析"等
-
An implementation of the dynamic encryptor based on the ergodic matrix over finite field is also given.
另外,本文还给出了基于有限域上遍历矩阵的动态加密器的一种具体的实现方案。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。