√在线天堂中文最新版网,97se亚洲综合色区,国产成人av免费网址,国产成人av在线影院无毒,成人做爰100部片

×

cryptographic algorithm造句

"cryptographic algorithm"是什么意思   

例句與造句

  1. Moreover , the method of choosing and using cryptographic algorithms fail to make customers feel safe
    密碼算法的選擇和使用過(guò)程也不能為用戶提供足夠的安全信心。
  2. The xml encryption specification lists a number of required and optional cryptographic algorithms including
    Xml加密規(guī)范列出了許多必需的和可選的密碼術(shù)算法,包括:
  3. One important aspect of the cryptographic algorithms localization is to eliminate the suspicion of a trapdoor
    密碼算法本土化的一個(gè)重要方面是消除密碼算法存在陷門(mén)的憂慮。
  4. Delegate determines whether authentication succeeds . the security protocol and cryptographic algorithms are already selected when the
    委托的方法時(shí)已經(jīng)選擇安全協(xié)議和加密算法。
  5. Method . create an object that implements a class of cryptographic algorithms such as a symmetric block cipher by calling the
    方法,創(chuàng)建實(shí)現(xiàn)該類(lèi)加密算法(如對(duì)稱(chēng)塊密碼)的對(duì)象。
  6. It's difficult to find cryptographic algorithm in a sentence. 用cryptographic algorithm造句挺難的
  7. Object that is initialized to the url identifier of the cryptographic algorithm used to generate the session key
    對(duì)象,該對(duì)象被初始化為用來(lái)生成會(huì)話密鑰的加密算法的url標(biāo)識(shí)符。將
  8. Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm
    描述如何將算法名稱(chēng)映射到加密類(lèi)以及如何將對(duì)象標(biāo)識(shí)符映射到加密算法。
  9. Again , let us remind you that using proprietary cryptographic algorithms , including hash functions , is usually a bad idea
    再次提醒您,使用專(zhuān)用密碼演算法,包括雜湊函數(shù),通常是一個(gè)壞主意。
  10. Describes how to map algorithm names to cryptographic classes and how to map object identifiers to a cryptographic algorithm
    描述如何將算法名稱(chēng)映射到加密類(lèi)以及如何將對(duì)象標(biāo)識(shí)符映射到加密算法。
  11. In this paper , we explain the theory of elliptic curves and discuss some work of design cryptographic algorithms and protocols
    這種密碼體制的誘人之處在于在安全性相當(dāng)?shù)那疤嵯?,可使用較短的密鑰。
  12. You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application
    可以使用此方法確定選定的加密算法和強(qiáng)度是否滿足您的應(yīng)用程序的要求。
  13. Public - key cryptographic algorithms use a fixed buffer size whereas secret - key cryptographic algorithms use a variable - length buffer
    公鑰加密算法使用固定的緩沖區(qū)大小,而私鑰加密算法使用長(zhǎng)度可變的緩沖區(qū)。
  14. A security service is some type of data protection , and is independent of the mechanism or cryptographic algorithm by which it is implemented
    安全服務(wù)是某種類(lèi)型的數(shù)據(jù)保護(hù),獨(dú)立于實(shí)現(xiàn)服務(wù)的機(jī)制或加密算法。
  15. And among the all of cryptographic algorithms , the rsa is the most widespread and securest public key algorithm in the world
    而在密碼算法領(lǐng)域, rsa公鑰密碼體制具有里程碑的意義,是應(yīng)用范圍最為廣泛和安全性最高的密碼算法。
  16. For example , data can be encrypted using a cryptographic algorithm , transmitted in an encrypted state , and later decrypted by the intended party
    例如,可以使用加密算法對(duì)數(shù)據(jù)進(jìn)行加密,在加密狀態(tài)下傳輸數(shù)據(jù),然后由預(yù)定的接收方對(duì)數(shù)據(jù)進(jìn)行解密。
  17. 更多例句:  上一頁(yè)    下一頁(yè)

相鄰詞匯

  1. "cryptograph"造句
  2. "cryptographer"造句
  3. "cryptographers"造句
  4. "cryptographic"造句
  5. "cryptographic accelerator"造句
  6. "cryptographic api"造句
  7. "cryptographic application programming interface"造句
  8. "cryptographic attack"造句
  9. "cryptographic authentication"造句
  10. "cryptographic boundary"造句
桌面版繁體版English日本語(yǔ)

Copyright ? 2025 WordTech Co.