英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Mathematicians broke the Japanese codes, and built the A-bomb.

是数学家破解了日本的密码,建造了原子炸弹。

This method will sew together that recognition if you practice this method for 10 minutes every day with the SLOW code A-Z file.

这一个方法将会一起缝纫承认如果你每天以慢的密码 A-Z 文件练习这一个方法 10 分钟。

Please enter the pass code of your account.

请您再次输入您的密码。

The pass code of your account can be any number of six digits.

抱歉,您输入的密码不正确。

Has been filed against a payment transaction associated with this account or with this account抯 registration code.

已经被申请对抗一个被和这一个帐户联合的付款交易或由于这一个帐户抯登记密码。

If the password expires every 90 days, that means on average the account is exposed for 45 days.

如果密码过期每隔90天,这意味著该帐户的平均暴露45天。

The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p-polynomials, as well as the permutation theory over finite field: The new definition of Chrestenson linear spectrum is given and the relation between the new Chrestenson linear spectrum and the Chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field; The distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field GF (2) and prime field F〓; The relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of Chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed; Using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized Bent functions over its prime field; The existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p-polynomials over finite field.

重新定义了有限域上逻辑函数的Chrestenson线性谱,考察了新定义的Chrestenson线性谱和原来的Chrestenson循环谱的关系,并利用一组对偶基给出了有限域上逻辑函数的反演公式;给出了有限域上随机变量联合分布的分解式,并利用随机变量联合分布的分解式对有限域上逻辑函数的密码性质进行了研究;给出了有限域上逻辑函数与相应素域上向量逻辑函数的关系,探讨了它们之间密码性质的联系,如平衡性,相关免疫性,扩散性,线性结构以及非线性度等;讨论了有限域上逻辑函数各类线性结构之间的关系,并给出了任意点都是线性结构的逻辑函数的全部构造,由此引出了有限域上的"泛仿射函数"的概念;考察了有限域上逻辑函数的退化性与线性结构的关系、退化性与Chrestenson谱支集的关系;给出了有限域逻辑函数非线性度的定义,利用有限域上逻辑函数的非线性度与相应素域上向量逻辑函数非线性度的关系,考察了有限域上逻辑函数的非线性度与线性结构的关系;利用有限域上逻辑函数与相应素域上向量逻辑函数的关系,揭示了有限域上的广义Bent函数与相应素域上的广义Bent函数的关系,以及有限域上的完全非线性函数与相应素域上向量广义Bent函数之间的关系;给出了任意有限域上任意n元完全非线性函数存在性与否的完整证明,并利用有限域上平衡的p-多项式的性质给出了有限域上完全非线性函数的一些基本构造方法。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

After amplying a 2.2kb fragment form the PPV-SC1 RF-DNA,we clone the fragment into pMD 18-T,named pTNSl.The whole sequence which is 1989 bp long was determined by sequencing, including the complete ORF of PPV-SC1 NS1 which encoding 662 amino acids.Alignment of pairs of sequence indicates that there are 98% and 99% similary with other porcine parvovirus strains Kresse and NADL-2, respectively. Multiple sequence alignment discloses that there are a few difference between ppv-scl nsl gene and other ppv nsl gene: A-G at 39nt,T-C at 153nt,A-G at 175nt, A-C at 1117nt, A-C at 1535nt .Alternative codon in ppv-scl nsl have distinctly different frequentfy by codonbias analysis at EMBOSS(http://genopole.toulouse.inra.fr/bioinfo/emboss). Thereis not distinct hydrophobicity and transmenbrane helices in ppv-scl nsl protein. Struction domain anslysis of PPV-SC1 NS1 protein indicate that there are a ATP/GTP-binding site motif A at 398-405,16 Protein kinase C phosphorylation site,21 Casein kinase II phosphorylation site,and 3 cAMP/cGMP-dependent protein kinase phosphorylation site.At the same time ,there is a same motif between ppv-scl nsl and Poxvirus D5 protein-like which may share in the same fuction which is necessary during virion duplication.

将PPV-SC1 NS1序列与其他PPV NS1基因进行多序列比对,结果显示,PPV-SC1 NS1与其他的PPV NS1的同源性较高,仅存在个别的差异,分别是第39位A→G,第153位T→C,第175位A→G,第1117位A→C,第1535位A→C;同源搜索比较表明,PPV-SC1与PPV NS1同源性可达98%、99%,与其他的细小病毒NS1基因也存在很大的保守性;密码子偏向性分析结果表明PPV-SC1 NS1基因在同一氨基酸的不同密码子的选择上存在一定的偏向性;PPV-SC1 NS1蛋白总体上说具有亲水性不存在明显的疏水性区段,用swiss TMPRED软件预测PPV-SC1 NS1的跨膜区,返回的结果并没有得到有显著意义的跨膜区的存在;根据基于motif数据库的结构域预测,PPV-SC1 NS1的第393-415位氨基酸残基存在潜在的ATP/GTP结合位点,该蛋白还存在16个蛋白激酶C磷酸化位点,21个酪蛋白激酶2磷酸化位点,3个cAMP-/cGMP依赖蛋白激酶磷酸化位点,PPV-SC1 NS1蛋白与POX_D5(痘病毒D5蛋白)具有一致的保守结构域,推测NS1可能与POX_D5有类似的功能。

第53/100页 首页 < ... 49 50 51 52 53 54 55 56 57 ... > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。