英语人>网络例句>密码地 相关的搜索结果
网络例句

密码地

与 密码地 相关的网络例句 [注:此内容来源于网络,仅供参考]

The method of DPA may attack on encrypted FPGA effectively,which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

差分功率分析方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。

In fact, standards working groups such as the one that produced the WEP standard often include a lot of very smart technologists, but not a single cryptographer, despite the fact they intend to develop security standards that rely explicitly on cryptographic algorithms.

事实上,在标准工作组,如一个产生了WEP标准的,往往包括了很多很聪明的技术人员,而不仅仅有一个译解密码者,尽管事实上他们打算制定的安全标准,很晃显地依赖加密算法。

Secure Sockets Layer: Egyptian-born cryptographer Taher Elgamal, chief scientist at Netscape Communications in the mid-nineties, devised SSL to provide privacy by encrypting communications between Web browsers and servers, promoting confidence in Web e-commerce.

埃及出生的密码学家Taher Elgamal,在上世纪90年代中叶是Netscape的首席科学家,他设计出了安全套接层SSL.SSL可以对Web浏览器与服务器之间的通信进行隐私保护和加密,这种技术极大地促进了电子商务的发展。

I really was not fundamentalists, and cryptographic techniques is always a subject of debate.

我真正地不是原教旨主义者,和密码技术总是一个辩论的主题。

With his own survival at stake, Langdon, aided by the police cryptologist Sophie Neveu, unveils a series of stunning secrets hidden in the works of Leonardo Da Vinci, all leading to a covert society dedicated to guarding an ancient secret that has remained hidden for 2000 years.

Langdon与法国美女密码专家 Sophie Neveu 在整理分析谜团的过程中,惊讶地发现在达文西的作品中藏有一连串令人震惊的线索。

In chapter three, the systems and technologies of cryptology used in this thesis are presented in detailed.

第三章详细地介绍了本文中用到的密码体制和技术。

In early April three cryptographic researchers at the Darmstadt Technical University in Germany revealed a method of exploiting the flaws far more effectively.

四月初期,在德国达姆施塔特工业大学,三位密码研究者透露了一种方法,以此可以更有效地利用这些缺陷。。

The definition and characters of Double-module quadratic residue is discussed in this paper,The arithmetic for choosing base point of Elliptic curve cryptosystem in optimal extension field is worked out and proven mathematically,moreover,the successful probability is also provided.

本文讨论了重模二次剩余的定义、性质,完整地设计出选取最优扩域上的椭圆曲线密码系统的基点的算法,并给出了选取成功的概率和相关数学证明。

A new method of finding the points on an elliptic curve by Maple is supplied; Maple is applied to the addition operation, the scalar product operation and the method of seeking the order of a basic point on the elliptic curve are proposed; the applications of Maple on ECC including encryption and decryption are supplied.

利用Maple编程求出椭圆曲线上有理点,用Maple实现椭圆曲线上两点的加法、点的数乘运算及求某个基点阶数的算法,利用Maple实现椭圆曲线密码体制的加密及解密。相比C语言,Maple语言更接近于平时说话的语法。同时,Maple语言可以方便地转化成C语言。

Euphemistically known as "legacy codes," they were in fact far older.

委婉地说,这些文件是早已过时的"遗产密码"。

第3/8页 首页 < 1 2 3 4 5 6 7 8 > 尾页
推荐网络例句

I didn't watch TV last night, because it .

昨晚我没有看电视,因为电视机坏了。

Since this year, in a lot of villages of Beijing, TV of elevator liquid crystal was removed.

今年以来,在北京的很多小区里,电梯液晶电视被撤了下来。

I'm running my simile to an extreme.

我比喻得过头了。