加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Because of the previous slowly enciphering of enciphering chip, we present a new method to accelerate enciphering, which designs chip based on an improving Matrix Coverage algorithm.
文章基于目前公钥密码加密芯片加密速度慢的缺点提出了一种新的方案,即根据一种改进的二次背包算法设计加密芯片。
-
With the development of digital image enciphering techniques,there appeared a lot of methods including those based on Arnold transformation and affine transformation and those based on theories of Hilbert curve,knight-tour problem,Gray code,etc.
随着图像加密技术的发展,出现了各种各样的加密方法,其中有基于Arnold变换、仿射变换、Hilbert曲线、幻方、骑士巡游、Gray码、混沌序列和基于频域的置乱加密技术。
-
It also encrypts the message using the RSA Triple-DES data encryption standard, which is a 168 bit encryption technology.
它也利用rsatriple-des数据加密标准对报文加密,此标准是168位的加密技术。
-
Creative point 3. Engrafting fuzzy recognition theory with information security theory, on the basis of elliptic curve cryptographic algorithm in information security theory, this paper presents t'-order iteration encryption, t-order iteration decryption algorithm of fuzzy recognition and authentication.
创新点3。将模糊识别理论与信息安全理论相互嫁接,相互交叉,以信息安全理论中的椭圆曲线加密算法为依据,提出模糊识别的t-阶迭代加密,t-阶迭代解密算法和对加密者的认证。
-
The rules of relational schemas'disassembling and recomposing are also proposed base on this. The security and efficiency of database structure encryption are evaluated.
用实例说明了结构加密的过程和结构加密定义的作用及涵义,对数据库结构加密方法的安全性和效率进行了评估。
-
Solution: Verify that your computer system, the normal checks in the parallel port interface on the dog, the normal will dog-drawn off on another correctly, run the fly-over, normal, explains encryption properly.
处置办法:查抄计算机编制,变态查抄插在并口上的加密狗接口,变态不兵加密狗拔下插在另一台变态的计算机上,运行飞腾,变态,表明加密变态。
-
NET Cryptography services and Crypto++ we need to encrypt data in one and decrypt it in the other.
NET的加密服务和加密++,我们需要一个数据加密和解密,其他的interop。
-
Those pieces of code are the workhorses of e-mail encryption, locking out intruders who don't have the right digital key to open the envelope.
数字包装器最被认可的形式是数字信封,这些代码主要完成电子邮件的加密,把想打开信封而没有正确数字密钥的入侵者挡在外面,数字信封主要由通过密码加密或软件算法加密的代码组成,运载着能正确让接收方识别发送方身份的数字签名。
-
Some cryptographers worry about the security of AES . They feel that the margin between the number of rounds specified in the cipher and the best known attacks is too small for comfort.
由於已遭破解的弱版的AES,其加密回圈数和原本的加密回圈数相差无几,有些密码学家开始担心 AES 的安全性:要是有人能将该著名的攻击加以改进,这个区块加密系统就会被破解。
-
D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.
前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。