√在线天堂中文最新版网,97se亚洲综合色区,国产成人av免费网址,国产成人av在线影院无毒,成人做爰100部片

×

cryptographic algorithm造句

"cryptographic algorithm"是什么意思   

例句與造句

  1. Asymmetric cryptographic algorithms , also known as public - key algorithms , require that each entity maintains a pair of related keys : a private key and a public key
    不對(duì)稱加密算法(也稱為公鑰算法)要求每個(gè)實(shí)體都維護(hù)一對(duì)相關(guān)密鑰:私鑰和公鑰。
  2. Public - key cryptographic algorithms are also known as asymmetric algorithms because one key is required to encrypt data while another is required to decrypt data
    公鑰加密算法也稱為不對(duì)稱算法,原因是需要用一個(gè)密鑰加密數(shù)據(jù)而需要用另一個(gè)密鑰來(lái)解密數(shù)據(jù)。
  3. The purpose of the machine was to emphasize just how vulnerable des a popular , government - sanctioned cryptographic algorithm really is . to read more on the des cracker , see
    具有安全性意識(shí)的程序會(huì)放棄root特權(quán)并讓操作系統(tǒng)知道它不應(yīng)再需要那些特權(quán)(至少在程序下一次運(yùn)行之前) 。
  4. As the core and the foundation of information security , the cryptography , especially the security of cryptographic algorithms , is the focus of correlated researches and discussions in the world
    作為信息安全的核心和基石,密碼算法特別是密碼算法的安全性一直是國(guó)內(nèi)外研究和討論的熱點(diǎn)問(wèn)題。
  5. For example , an enterprise that has its own implementation of a cryptographic algorithm can make that implementation the default instead of the implementation shipped in the . net framework sdk
    例如,某個(gè)企業(yè)可以將自己的加密算法實(shí)現(xiàn)設(shè)置為默認(rèn)實(shí)現(xiàn),而不是使用. net framework sdk中提供的算法實(shí)現(xiàn)。
  6. It's difficult to find cryptographic algorithm in a sentence. 用cryptographic algorithm造句挺難的
  7. The . net framework sdk allows computer administrators to configure the default cryptographic algorithms and algorithm implementations that the . net framework and appropriately written applications use
    . net framework sdk允許計(jì)算機(jī)管理員配置默認(rèn)加密算法和算法實(shí)現(xiàn),供. net framework和正確編寫(xiě)的應(yīng)用程序使用。
  8. Public - key cryptography is used for strong authentication , but x . 509 is not dependent on the use of a particular cryptographic algorithm , though two users wishing to authenticate must support the same algorithm
    強(qiáng)認(rèn)證使用公鑰加密方式,但是x . 509并不依賴于使用特殊加密算法,盡管兩個(gè)用戶希望認(rèn)證必須支持同一算法。
  9. Secondly , in order to develop and apply aes algorithm better , and design cryptographic algorithm independently , the paper deeply research the design principle and security of the aes algorithm
    其次為了更好開(kāi)發(fā)應(yīng)用aes算法,并實(shí)現(xiàn)分組加密密碼算法的本土化設(shè)計(jì),對(duì)分組加密算法aes的設(shè)計(jì)原理、安全性能方面進(jìn)行了深入的研究。
  10. We identify two categories of operations in symmetric - key and public - key cryptographic algorithms that are not common in previous general - purpose workloads : advanced bit operations within a word and multi - word operations
    我們區(qū)別對(duì)稱密鑰和公共密鑰加密算法中的兩類運(yùn)算:面向位的運(yùn)算和多字運(yùn)算,他們?cè)谝酝ㄓ秘?fù)載中并不常見(jiàn)。
  11. The reverse process of converting cipher text back into plain text is called decryption . a cryptographic algorithm frequently referred to as a cipher is a mathematical function to perform encryption , and vice versa , using keys
    加密技術(shù)范指透過(guò)特定程序算法及密碼匙,將訊息從初始普通文本轉(zhuǎn)換為另一種不易理解的形式密碼文本。
  12. It uses symmetric and cryptographic algorithms like data encryption standard ( des ) , and triples des to encrypt the payload . together , the ipsec esp and ah protocols provide privacy , integrity , and authentication of ip packets
    Esp利用對(duì)稱加密算法(如des ,三重des )加密有效載荷。 ah與esp一起為ip包提供機(jī)密性,完整性和身份源認(rèn)證服務(wù)。
  13. But at present , many mobile banking systems only use some cryptographic algorithms as security measures , without depicting the procedure of message exchanging as a secuity protocol , needless to say how to analyze it or provide the correctness proof of it
    但目前很多手機(jī)銀行系統(tǒng)中只是簡(jiǎn)單的使用了若干密碼算法作為安全措施,沒(méi)有把消息交換過(guò)程抽象描述成安全協(xié)議的形式,更談不上對(duì)其進(jìn)行形式化的分析證明。
  14. Because of the importance of non - repudiation to electronic commerce activities and the fact that non - repudiation protocol is relatively few , this paper adopts the modern cryptographic algorithms and techniques and designs a mutually undeniable cryptographic protocol
    介于不可否認(rèn)協(xié)議對(duì)電子商務(wù)活動(dòng)開(kāi)展的重要性以及不可否認(rèn)協(xié)議相對(duì)較少這一事實(shí),利用現(xiàn)有的密碼算法與密碼技術(shù),提出一種改進(jìn)的雙方不可否認(rèn)密碼協(xié)議方案。
  15. With the fast development of internet applications , information security has beome more and more important . the problem of the trustworthiness and security has also been more and more important . so we need best digital signature algorithm and cryptographic algorithm
    隨著網(wǎng)絡(luò)逐步成為社會(huì)的主要神經(jīng),網(wǎng)絡(luò)上的誠(chéng)信問(wèn)題和安全問(wèn)題日益?zhèn)涫荜P(guān)注,數(shù)字簽名是網(wǎng)絡(luò)用戶實(shí)現(xiàn)電子簽名的主要手段,為用戶提供了誠(chéng)信和安全的保障。
  16. It goes without saying the importance of network and information se - curity . now , about communication and information security has come to people ' s attention . study cryptographic algorithms and protocols is a very important research subject , which is the core technique of the information security - cryptography
    病毒,黑客,網(wǎng)絡(luò)犯罪給網(wǎng)絡(luò)用戶造成的危害也越來(lái)越大。網(wǎng)絡(luò)與信息安全的重要性不言而喻。因此,保密通信和信息安全越來(lái)越受到人們的重視。
  17. 更多例句:  上一頁(yè)    下一頁(yè)

相鄰詞匯

  1. "cryptograph"造句
  2. "cryptographer"造句
  3. "cryptographers"造句
  4. "cryptographic"造句
  5. "cryptographic accelerator"造句
  6. "cryptographic api"造句
  7. "cryptographic application programming interface"造句
  8. "cryptographic attack"造句
  9. "cryptographic authentication"造句
  10. "cryptographic boundary"造句
桌面版繁體版English日本語(yǔ)

Copyright ? 2025 WordTech Co.