英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

This paper applies Particle Swarm Optimization algorithm in the cryptology area to design Boolean function in cryptography.

将粒子群(Particle Swarm Optimization,PSO)算法应用于密码学领域,设计密码学中的密码函数—布尔函数。

Second, in the viewpoint of crypto analysis, the practical requirement for the cryptographic function is to construct the function that can resist all the known crypto analysis and attacks. In advanced, the main cryptographic properties are compared, and the relation among these cryptographic properties is analyzed, including the trade-off ones. Get the conclusion that the construction of cryptographic Boolean function is to find out the proper Boolean function in the whole vector space under the restriction of several cryptographic properties required for the security system.

然后本文从密码分析的角度,讨论了密码函数的实际需求,即构造能够抵抗已有密码分析与攻击的布尔函数;分析了布尔函数的主要的密码学性质,并比较了这些性质之间的相互关系,包括制约的关系;得出了构造布尔函数的实质的结论,即在向量空间中构造全体布尔函数,以所需的若干密码学性质作为限制条件,用有限域上的多项式、Walsh谱、Hadamard矩阵等数学工具找出适当的布尔函数用于加密体制的设计。

Article 38 The testing and evaluation work on passwords and ciphering equipments used for protecting information system security shall be undertaken by an evaluation agency authorized and admitted by the State Cipher code Administration.

第三十八条信息系统中的密码及密码设备的测评工作由国家密码管理局认可的测评机构承担,其他任何部门、单位和个人不得对密码进行评测和监控。

In terms of the difference between encryption key and decryption key,it can divide into symmetry cryptogram and public key cryptogram.

根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。

The cryptographer would break the cipher, the amateur would make a change to "fix" it, and the cryptographer would break it again.

密码学家攻破他的密码,他又会做些改变来"修正"它,密码学家又再次攻破它。

If the input password is correct, then from P3.0 output unblanking signal, if the input password is not correct, then from P3.1 output password rub-out signal, if continual three times inputs the password is wrong, then from P3.2 output alarm, once the output alarm, after must wait for relieves reports to the police only then unlocks.

如果输入密码正确,则从P3.0输出开锁信号,如果输入密码不正确,则从P3.1输出密码错误信号,如果连续三次输入的密码均是错的,则从P3.2输出报警信号,一旦输出报警信号,就必须等待解除报警后方可重新开锁

And the SAV client uninstall password won't work with server group password too, as if you enter that password, you will receive an invalid password message.

和sav客户端卸载密码将不工作,与服务器组的密码,因为如果您输入的密码,您将收到一个密码无效的讯息。

Or you can be written on notebook on your password, use duplicate and stickup method next, the password stickup to password column, such hackers also cannot get your password.

或者您可以在记事本上写上您的密码,然后用复制粘贴的办法,把密码粘贴到密码栏,这样黑客也就无法得到您的密码了。

Even though functions that create hashed passwords may be cryptographically secure, possession of a hashed password provides a quick way to verify guesses for the password by applying the function to each guess, and comparing the result to the verification data.

即使职能创造散列密码,可密码安全藏有密码散列提供了一种快捷的方式来验证猜测的密码用功能每个猜测,比较结果的核实数据。

A lot of applied cryptosystems we use now are computational secure, but with the progress of computational power and cryptanalytic technique, the cryptosystems that are computational secure will become more and more insecure, so it will be more and more important to study theoretical security of cryptosystem.

目前我国在密码技术的应用水平方面与国外还有一定的差距。现在许多实用的密码体制都是计算安全的,但是随着计算能力的提高和密码分析的技术进步,计算安全的密码体制将会越来越不安全,因此,密码体制的理论安全研究越来越重要。

第21/100页 首页 < ... 17 18 19 20 21 22 23 24 25 ... > 尾页
推荐网络例句

The reasons of iron ions content overproof in grade Ⅱ desalting water system,such as variation water quality,contamination of regenerant , operation adjustment of pretreatment system and switching operation of bed were discussed.

对二级脱盐水系统中铁离子含量超标的原因,如来水水质发生波动、再生剂受到污染、预处理系统操作调整、床体运行切换等进行了论述。

You were hired to drum up new business, so go and do it.

公司雇你招徕新业务,你就做你的事好了。

Who is in possession of this?

这是谁的?