cryptographic algorithm造句
例句與造句
- Moreover , the method of choosing and using cryptographic algorithms fail to make customers feel safe
密碼算法的選擇和使用過(guò)程也不能為用戶提供足夠的安全信心。 - The xml encryption specification lists a number of required and optional cryptographic algorithms including
Xml加密規(guī)范列出了許多必需的和可選的密碼術(shù)算法,包括: - One important aspect of the cryptographic algorithms localization is to eliminate the suspicion of a trapdoor
密碼算法本土化的一個(gè)重要方面是消除密碼算法存在陷門(mén)的憂慮。 - Delegate determines whether authentication succeeds . the security protocol and cryptographic algorithms are already selected when the
委托的方法時(shí)已經(jīng)選擇安全協(xié)議和加密算法。 - Method . create an object that implements a class of cryptographic algorithms such as a symmetric block cipher by calling the
方法,創(chuàng)建實(shí)現(xiàn)該類(lèi)加密算法(如對(duì)稱(chēng)塊密碼)的對(duì)象。 - It's difficult to find cryptographic algorithm in a sentence. 用cryptographic algorithm造句挺難的
- Object that is initialized to the url identifier of the cryptographic algorithm used to generate the session key
對(duì)象,該對(duì)象被初始化為用來(lái)生成會(huì)話密鑰的加密算法的url標(biāo)識(shí)符。將 - Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm
描述如何將算法名稱(chēng)映射到加密類(lèi)以及如何將對(duì)象標(biāo)識(shí)符映射到加密算法。 - Again , let us remind you that using proprietary cryptographic algorithms , including hash functions , is usually a bad idea
再次提醒您,使用專(zhuān)用密碼演算法,包括雜湊函數(shù),通常是一個(gè)壞主意。 - Describes how to map algorithm names to cryptographic classes and how to map object identifiers to a cryptographic algorithm
描述如何將算法名稱(chēng)映射到加密類(lèi)以及如何將對(duì)象標(biāo)識(shí)符映射到加密算法。 - In this paper , we explain the theory of elliptic curves and discuss some work of design cryptographic algorithms and protocols
這種密碼體制的誘人之處在于在安全性相當(dāng)?shù)那疤嵯?,可使用較短的密鑰。 - You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application
可以使用此方法確定選定的加密算法和強(qiáng)度是否滿足您的應(yīng)用程序的要求。 - Public - key cryptographic algorithms use a fixed buffer size whereas secret - key cryptographic algorithms use a variable - length buffer
公鑰加密算法使用固定的緩沖區(qū)大小,而私鑰加密算法使用長(zhǎng)度可變的緩沖區(qū)。 - A security service is some type of data protection , and is independent of the mechanism or cryptographic algorithm by which it is implemented
安全服務(wù)是某種類(lèi)型的數(shù)據(jù)保護(hù),獨(dú)立于實(shí)現(xiàn)服務(wù)的機(jī)制或加密算法。 - And among the all of cryptographic algorithms , the rsa is the most widespread and securest public key algorithm in the world
而在密碼算法領(lǐng)域, rsa公鑰密碼體制具有里程碑的意義,是應(yīng)用范圍最為廣泛和安全性最高的密碼算法。 - For example , data can be encrypted using a cryptographic algorithm , transmitted in an encrypted state , and later decrypted by the intended party
例如,可以使用加密算法對(duì)數(shù)據(jù)進(jìn)行加密,在加密狀態(tài)下傳輸數(shù)據(jù),然后由預(yù)定的接收方對(duì)數(shù)據(jù)進(jìn)行解密。