加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption.
它可以在3个层次上,使用448位Blowfish加密,具有模糊性的高级加密。
-
A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.
一个加密库代码,有AES,BLUEFISH的很多种加密算法。
-
RSA cryptography system is the easiest system to be understood among the public key cryptography systems and it's the most populer cryptography system in use. This paper will go into the RSA cryptography system and implement a small cryptosystem using Boland C++ to module the course of the RSA cryptography system.
RSA密钥体制是公开密钥体制中最容易理解,也是应用最广泛的一种加密方法,本文在深入研究RSA密钥体制的基础上,使用Boland C++实现了一个小型的RSA加密系统来模拟RSA算法的整个过程。
-
Proposed own through oneself to the encryption algorithm study research regarding the encryption algorithm improvement thought:Along with the rapid development of computer technology, Even using the exhaustive methods to pay only a smaller price can be completed within a few days break request.
加密算法的实际应用:利用汇编语言实现DES加密、DES算法的VLSI实现、FPGA上的DES算法实现。
-
The feature enables the usage of different A5 algorithms (currently A5/1 and A5/2) and gives an alternative of using no ciphering at all (A5/0). A5/2 allows ciphering to be used in some market areas as in some areas the use of A5/1 is forbidden.
这功能使得不同的A5算法的应用(目前的A5/1和A5/2)得以实现,同时给没有使用任何加密(A5/0)提供了可供选择的办法。A5/2允许在某些市场区域中使用加密,因为在某些区域中,A5/1的使用是被禁止的。
-
The buffer memory is used to store the deciphering bits output from a duplex ciphering algorithm at the time the ciphering bits are generated.
缓存存储器在产生加密比特时用于存储双重加密算法的解密比特输出。
-
First, let's get a few terms out of the way.In cryptography, a file of any type that isn't encrypted is called plaintext;encrypted data is called ciphertext .
首先,让我们解释几个术语上的拦路虎,在密码学中,没有加密的任何形式的文件都被叫做普通文本,而加密的数据则叫做密码文本。
-
A group of researchers in Princeton University have managed to prove and demonstrate that disk encryption mechanism used by BitLocker of Windows Vista; FileVault of MacOS X; dm-crypt of Linux, TrueCrypt and possibly other secure encryption software, can be cracked, hacked and defeated by imaging state of physical memory which still carry and retain traces of code bits, in what hackers called cold boot attack by dumping all data in memory to disk.
一组研究人员在美国普林斯顿大学已成功地证明,表明磁盘加密机制,利用BitLocker的Windows Vista的; FileVault的MacOS下;德国马克,隐窝的Linux , TrueCrypt ,可能还有其他安全的加密软件,可以被破解,黑客入侵并打败由成像状态的物理内存,其中仍保留痕迹的代码位,在什么所谓的黑客攻击冷启动倾倒所有的数据在内存到磁盘。
-
Files and folders are encrypted with a strong encryption algorithm, using a combination of a unique user key and the password.
文件和文件夹加密与一个强大的加密算法,使用相结合的一个独特的用户的关键和密码。
-
Afterward, the main control desk encrypts the session key by using a public key, and transfers encrypted configuration information and session key to configuration server of network phone.
然后,主控台以一公开密钥对会话密钥进行加密,并传送已加密过的配置信息与会话密钥至网络电话配置服务器。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。