英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Transaction software,"communication code" setting, as the beginning of "888888", users log on for the first time in a timely manner after the revised code of communication, and the characters could be any number of combinations.

交易软件有"通讯密码"设置,初设为"888888",用户在第一次登录后及时修改通讯密码,可以是任意字符和数字的组合。

Elliptic Curve Cryptosystem is a kind of public-key cryptosystem based on algebraic curve.

椭圆曲线密码体制是一种基于代数曲线的公钥密码体制。

Double click entry for username/password copy - If AutoType fails, you can double click an entry to have its password copied to the clipboard.

双击进入用户名/密码复制-如果a utotype失败,你可以双击一个条目有它的密码复制到剪贴板。

It must improve the commonly symmetrical key block cipher arithmetic for ensuring that the data length will not be increased after encryption: using forward shift bits mode in Triple DES with Two Keys; using cipher text stealing mode in RC5 with Cipher Block Chaining.

为保证加密后数据长度不变,应对常用的对称密钥分组密码算法以改进:双密钥三重DES加密采用向前挪位法,RC5密码分组链接加密采用密文窃取方式。

We provide a substitution box, exponential permutation which has much measurable security, and give a enumerating result and a fast algorithm of calculating such permutation. An almost perfect nonlinear exponential permutation with high algebric degree is proposed. with some discussion on how to select the parameters of such permutation. The experimental result shows us a conjecture that there exists no such permutation over even dimensional space. As a way of generating substitution boxes, we briefly point out the cryptographic weakness of the exponential functions derived from such permutation. We also present two new cryptographic indexes, fixed point and cyclic structure, on which we investigate the performance of such permutation. Finally, we give a viewpoint about the application of correlation immune functions in designing substitution boxes.

提供了一种可度量安全强度的代换盒-幂置换;详细阐述了幂置换的实现和计数问题;给出了一种计算幂置换的快速算法;从几乎完善非线性幂置换角度讨论了幂置换参数的选取,并提出了一种高次几乎完善非线性置换;通过试验给出了关于偶数维空间上几乎完善非线性幂置换的一个猜想;简要给出了由幂置换派生出的幂函数的密码局限性;针对幂置换,提出了两个密码安全指标:不动点和循环结构;证明了幂置换在这两个指标下的密码性能;简要讨论了相关免疫函数与代换盒设计的关系。

To begin with, theory of FCSR and its sequence is summarized and investigated. Furthermore, emphasis is placed on the vaule of 2-adic complexity. A conclusion is drawn that the vaule lies in the relation between 2-adic complexity and lineai complexity of a same seqence. Fact that there exists sequence with high linear complexity but low 2-adic complexity is given and analyzed. The value of 2-adic complexity in cryptanalysis can be directly drawn from the very fact. A series of problems are opened based on the value and discussions are done in various depth. Some good results are obtained in these problems such as the 2-adic complexity distribution of periodic sequences and the stability of 2-adic complexity. The value of FCSR in stream cipher design is discussed at the same time.

首先对FCSR及其序列理论进行了系统的总结和研究,然后重点探讨了2-adic复杂度的流密码意义,通过论证表明,存在线性复杂度较大而2-adic复杂度较小的序列类,从而明确了2-adic复杂度的流密码分析意义,进而提出了一系列相关的研究问题并进行了不同深度的探讨,对其中周期序列的2-adic复杂度分布和2-adic复杂度的稳定性等问题得到了较好的结果;同时对FCSR的流密码设计意义进行了探讨,对其中的问题给出了一些思路或简单结论。

In the exploration of the self-dependent techniques of the cryptography, the Cellular Automata is viewed as the most potential of the kernel technique in the self-dependent techniques of the cryptography by its simple,regular and high parallel processing architecture which is suitable of VLSI implementation and its complicated dynamic properties.

在自主密码技术的探索中,细胞自动机特有的适合VLSI实现的简单、规则、高度并行的物理结构和复杂的动力学特性非常适合在密码学中的应用,被认为是密码技术自主化方面最有希望的核心技术之一。

So when user want to switch browsers, upgrade to a new computer, or simply want to record down the password, View Passwords Bookmarklet can retrieve and display the password covered behind asterisked text on screen.

因此,当用户想要切换的浏览器,升级到一个新的电脑,或只是想记录下来的密码,查看密码,书签可以检索和显示的密码涵盖的背后asterisked文字在屏幕上。

For example, if the two methods used are the Playfair cipher and simple columnar transposition, if transposition is used first, the Playfair cipher can still be attacked, because it takes each input letter to a limited number of substitutes; if the Playfair cipher is used first, multiple anagramming, although now much more difficult, is still possible because a text enciphered by Playfair still has digraph frequencies marked well enough to allow a correct match to be detected.

例如,如果这两种方法用的是playfair密码和简单的柱状移位,如果移位是用第一, playfair密码仍然可以被攻击,因为它需要每个输入信有限数量的代用品;如果playfair密码是用来首先,多重anagramming ,虽然现在困难得多,仍然有可能因为一个文本加密由playfair仍然有向图的频率明显做得不够好,让一个正确的匹配,以进行检测。

This paper applies the encryption to the sensor of taximeters.It provides encrypt ion models and system structure model of encrypting sensor of taximeters based on analyzing bugs of sensor of taximeters now,then designs hardware of Encrypting machine,decoding machine and machine that writes into secret code using PIC12C508A,PIC12CE518A and INTER8031.Secret code sensors after encrypting raise accuracy and security of taxi charges greatly,and solve existing difficult problems of reliability and management i...

该文把加密技术用于出租车计价传感器中,在分析现有出租车传感器漏洞的基础上,提出了出租车加密传感器的加密模型和系统结构模型,采用PIC12C508A、PIC12CE518A和INTER8031单片机完成了密码传感器系统中加密器、解密器和密码写入器软硬件系统设计,加密后的密码传感器大大提高了出租车计价器计费的准确性和安全性,解决了现有出租车计价器可靠性不高和难以实现统一管理的难题。

第28/100页 首页 < ... 24 25 26 27 28 29 30 31 32 ... > 尾页
推荐网络例句

What would he tell Judith and the children?

他将怎样告诉朱迪丝和孩子们呢?

I this is at that time, the opinion with peacockish true girl is full of in a heart.

这就是当时的我,一个心中布满虚荣的女孩子真实的想法。

Oh, and I bought myself a new laptop," he said."

哦,我还给我自己买了一个新笔记本"他说。"