密码的
- 与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
First, let's get a few terms out of the way.In cryptography, a file of any type that isn't encrypted is called plaintext;encrypted data is called ciphertext .
首先,让我们解释几个术语上的拦路虎,在密码学中,没有加密的任何形式的文件都被叫做普通文本,而加密的数据则叫做密码文本。
-
These two types construct the basis of codon usage on the function and expression stage, respectively.
痘苗病毒以基因的功能构筑密码子使用类型的基础,而腺病毒则以表达的时相构筑密码子使用类型的基础。
-
After deeply analyzing the universally composable security, we defined the level of different ideal functionalities for the same cryptographic task, and pointed out the rationality in defining the levels of ideal functionalities.
针对以上问题,在对任意组合安全理论进行深入分析后,本文给出了同一密码原语不同理想功能之间安全等级的定义,并说明了这种定义的合理性,从而刻画了同一密码原语的不同理想功能之间的关系。
-
The divisor class group, often called Jacobian group, based on which hyperelliptic curve cryptosystems are constructed, is much complicated than the elliptic curve rational point group.
但由于可以在一个很小的基域上构造具有较大素数因子阶的Jacobian群,且可应用于密码体制的超椭圆曲线比较丰富,这使得超椭圆曲线密码体制也逐渐受到人们的重视。
-
By comparing the performance of RSA and ECC, the method on how to intercept the elliptic curves and how to code the Elliptic Curve Crytosystems was provided. Fast point multiplication on a family of Koblitz elliptic curves in characteristic 3 is considered.
第二部分首先深入研究了用于身份认证和密钥分发的公钥密码体制,对RSA和ECC的性能进行比较,对椭圆曲线的选取和椭圆曲线密码体制的加密、解密算法设计进行探讨。
-
By comparing the performance of RSA and ECC, the method on how to intercept the elliptic curves and howto code the Elliptic Curve Crytosystems was provided. Fast point multiplication on a family of Koblitz elliptic curves in characteristic 3 is considered.
第二部分首先深入研究了用于身份认证和密钥分发的公钥密码体制,对RSA和ECC的性能进行比较,对椭圆曲线的选取和椭圆曲线密码体制的加密、解密算法设计进行探讨。
-
The method introduced in this article is a promising way for estimating codon homozygosity of the absent amino acid, and it can be further used to evaluate the relative importance of nucleotide composition in determining codon usage.
本研究引入的新方法可以有效的预测基因中缺失氨基酸的密码子纯合性,同时该方法可以被用来判断基因中核苷酸组成对密码子使用影响的相对重要性。
-
You of the IP has already been target, disallowing to register to contain in the user's name systematic disallow of character list the user's name disallows all to find back for the numeral the password hints a problem and can't can't disallow to register to contain in the pet name for empty(can't be big in 50) this pet name system for getting empty(can't be big in 50) to find back the password problem answer systematic disallow of character list the pet name can't be big in 50 the character lists have already had this pet name in the system, please change pet name implies illegal character list to carry on in the user's name the IP controls you of IP because the malice registers a quilt to forbid completion to register to register success at the time, but current system the constitution passes to examine for the demand, you turn to the system home page to congratulate automatically after temporarily doing not manage legal power 5ly!
你的IP已被锁定,不允许注册用户名中含有系统不允许的字符用户名不允许全部为数字找回密码提示问题不能为空(不能大于50)找回密码问题答案不能为空(不能大于50)此昵称系统不允许注册昵称中含有系统不允许的字符昵称不能大于50字符系统中已经有这个昵称存在,请更改昵称用户名中含有非法字符进行IP控制您的IP因为恶意注册被临时禁止完成注册注册成功,但当前系统设置为需要通过审核,您暂时没有管理权限 5秒后自动转到系统首页恭喜!
-
In cryptography,the additional characters added to a plaintext message,to ensure that its length is an integral number of blocks for encryption by a block cipher.
在密码学中,为了使明文信息的长度为分组密码加密中所用的块的整数倍,而在明文中添加的附加字符。
-
In the traditional way of using log-on password, one should memorize a long sequence of password which satisfies some complexity rules.
使用传统的登录密码方法不但需要记忆一长串复杂的满足某种复杂度要求的口令,而且一旦登录密码被窃取,计算机系统的安全将无法保证。
- 推荐网络例句
-
The concept of equivalent rotationally rigidity is offered and the formula of rotationally rigidity is obtained.
主要做了如下几个方面的工作:对伸臂位于顶部的单层框架—筒体模型进行分析,提出了等效转动约束的概念和转动约束刚度的表达式。
-
Male cats normally do not need aftercare with the exception of the night after the anesthetic.
男猫通常不需要善后除了晚上的麻醉。
-
Its advantage is that it can be used in smaller units.
其优点在于可以在较小的单位中应用。