单词 | cipher |
释义 |
复数:ciphers 现在分词:ciphering 过去分词:ciphered n. cipher key 例句释义: 密码,零〔即0〕,阿拉伯数字,密码索引,计算,〔美口〕算出,运算,用密码书写,暗号,密文,加密算法 1. The Cipher Card can be used to any computer with USB interface, furthermore, its fixing is simple and its use is convenient. 该加密卡可应用于任何一台具有USB接口的计算机终端上,而且安装简单、使用方便。 www.edu-hb.com 2. For starters, every possible Cipher configuration is always represented by an instance of javax. crypto. Cipher. 对于初学者,每个可能的加密配置总是由一个javax.crypto.Cipher实例表示。 www.infoq.com 3. You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks. 以这种方式继续一块接一块地生成每一个块的密文形式。 www.ibm.com 4. In the interest of science, I will cipher it out on the hypothesis that it is masculine. 出于本人对科学的爱好,我假定它应该是阳性的。 www.bing.com 5. On the surface, the Enigma cipher machine looked like a regular typewriter, but it wasn't. 从表面看,英格玛密码机就像是一台普通的打字机,但实际上它却另有用途。 www.bing.com 6. The P-valued logic functions satisfying K order propagation criterion have been used widely in the design of block cipher. 满足K次扩散准则的p值逻辑函数在密码设计中有重要应用。 www.dictall.com 7. If the plain text to be encrypted contains substantial repetition, it is feasible for the cipher text to be broken one block at a time. 如果要加密的纯文本包含大量重复的块,则逐块破解密码文本是可行的。 msdn2.microsoft.com 8. This was a kind of a motor cipher that you can encode into the muscle system and use to induce a variety of ideas in participants. 这是一种运动神经密码,你可以给肌肉系统编码,然后利用它来诱发参加者们的大量思想活动。 www.bing.com 9. The listener then deciphers this according to his own reference of blueness and transmits it to you in his own cipher. 然后听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。 blog.sina.com.cn 10. and the lock core is matched with a set of or two sets of mechanism cipher locking mechanisms. 锁芯配有一套或两套机构密码锁定机构。 ip.com 1. DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits. 即美国国家数据加密标准(theUnitedStatesDataEncryptionStandard),是一个块密码算法,块长8字节,密钥长56位。 www.ibm.com 2. One way to compromise data encrypted with this type of cipher is to perform an exhaustive search of every possible key. 可以危及用此类型密码加密的数据的一个方法是,对每个可能的密钥执行穷举搜索。 msdn2.microsoft.com 3. We asked the post office to fault the telephones, and went in to make a visual inspection of the cipher room area. 我们让邮局给电话弄点儿故障,然后进入大使馆对密码室所在的位置作一番目视观察。 www.jukuu.com 4. The cipher's strength is not in its design; anyone could design something like that. The strength is in its analysis. 密码的强度不在于其设计,任何人都可以设计类似的东西,它的强度在于分析。 www.vipcareer.com 5. If a bit in the cipher text is mangled , the corresponding bit of plain text will be mangled . 如果密码文本块中有一个位出错,相应的纯文本块也将出错。 www.bing.com 6. Amount of ceramic tile of the computation that press a plan uses ceramic tile gross plus place of cipher out of normal construction loss. 按图计算瓷砖数量再加上正常施工损耗算出所用瓷砖总量。 dictsearch.appspot.com 7. American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. 美国20世纪的数据加密标准DES是到目前为止使用最广、讨论最多的分组密码算法之一。 www.fabiao.net 8. S-boxes are the only nonlinear components in many block cipher algorithms, and they decide the security strength of the whole algorithm. S盒是许多分组密码唯一的非线性部件,它的密码强度决定了整个密码算法的安全强度。 kns50.chkd.cnki.net 9. One of the cipher clerks came out and engaged our escort in animated conversation . 有一个译电员走出来与我们的陪同人员热烈地交谈起来。 www.jukuu.com 10. Using the certificate(s), cipher parameters are passed between the client and server to set up the secure connection. 使用证书,在客户机和服务器之间传递密码参数,以建立安全连接。 www.ibm.com 1. The privatization of CPU is to cipher the instruction and data, store only encrypted data in external memory out of CPU. CPU私化是通过加密指令和数据,使其对外部以密文存在,来达到私化的目的。 www.xactad.org 2. The block cipher with a substitution permutation network is the best known and widely used block cipher system. 包含代替置换网络的分组密码是一种广泛使用的分组密码系统。 dict.kekenet.com 3. The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration. 提出一种基于混沌迭代的加密算法,这种加密算法根据混沌迭代确定的位置将明文填入一个较大的密文空间。 www.dictall.com 4. Although it tends to execute more slowly than stream cipher, block cipher is more secure. 尽管块密码的执行速度慢于流密码,但块密码更安全。 msdn2.microsoft.com 5. Given that a specific cipher has no major design flaws , key length is the primary determinant of security . 如果某个加密算法没有大的设计缺陷,那么密钥长度就是安全性的决定因素。 www.bing.com 6. The result of the encryption of the last 8-byte block (discarding all previous cipher blocks) is the outcome of Step 9. 第9步的结果是最后8字节块的加密结果(放弃所以以前的密文块)。 www.ibm.com 7. Brute force attack on block cipher algorithm is an important direction of cryptology . 暴力破解分组密码算法是密码学的重要研究方向。 dictsearch.appspot.com 8. Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process. 建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。 www.xactad.org 9. But though the Kid's moral maturation is heartening, his personality remains largely a cipher, as anonymous as his lack of a name. 然而,虽然这孩子的道德观念走向成熟令人振奋,但他的性格特点,在很大程度上,仍然无足轻重,就像他的名字一样,荡然未存。 www.bing.com 10. Electronic certification service systems shall be built by entities qualified for producing cipher code products for commercial uses. 电子认证服务系统应当由具有商用密码产品生产资质的单位承建。 eng.chinalawinfo.com 1. Choosing transport triggered architecture as a platform, applying this method o cipher domain validates its efficiency. 选取传输触发体系结构作为平台,在密码领域中三类算法的应用验证了该方法的有效性。 www.ceps.com.tw 2. I thought that she could open her hand and show me the germ , the true cipher of life. 我认为她会摊开手心,给我看生命的胚胎,真正的人生奥秘。 dict.veduchina.com 3. And the Engineer is no robotic cipher, but a very human enemy. 这个工程师不是机器密码,而却是人类的敌人。 www.ecocn.org 4. For streaming encryption, block cipher needs to be translated into the work flow model. 对于流加密,需要将分组密码转化为流模式工作。 nulung.com 5. At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data. 最后,串接所有密文块以得到全部纯文本数据的密文形式。 www.ibm.com 6. The British were constantly increasing their cipher security. 英国人不断地加强密码的保密措施。 dict.veduchina.com 7. also you can use any of four encryption modes: Electronic Codebook, Cipher Block Chaining , Cipher Feedback and Output Feedback. 你也可以使用任何四个加密方式:电子码密码块链接,密码反馈和输出反馈。 dictsearch.appspot.com 8. Note that not all of the digest and ciphers here are supported, but your OpenSSL must support the cipher and digest that you want to use. 注意,并非这里的所有摘要和密码都受到支持,但您的OpenSSL必须支持您想要使用的密码和摘要。 www.ibm.com 9. The strings used to specify the different cipher algorithms are given in the product documentation. 用于指定不同加密算法的字符串在产品文档中有描述。 www-128.ibm.com 10. Data cryptographic techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. 信息技术.数据密码技术.采用字组数字算法检验密码的数据完整性机制 www.mapeng.net 1. Property contains the cipher strength of the encryption algorithm used on this connection. 属性包含该连接所使用的加密算法的密码长度。 msdn2.microsoft.com 2. Block cipher algorithms encrypt data in block units , rather than a single byte at a time . 块密码算法以块为单位加密数据,而不是逐个字节地加密数据。 www.bing.com 3. He was a zero, and even the fact that he was dead wouldn't add a cipher to his name. 他是一个零,甚至死亡也无法在他的名字上添上什么。 www.bing.com 4. It is a cipher that Dr. Watson and I have had occasion to solve. But why--what's amiss with the names? 这是华生医生和我两个人偶然从一封密码信中破译出来的。可是怎么,这两个名字出什么岔子了吗? tigor108.tianyablog.com 5. In so doing, it may employ all appropriate means, including diplomatic couriers, diplomatic bag, and messages in code or cipher. 通讯可以采用一切适当方法,包括外交信使、外交邮袋和明码、密码电信在内。 www.lawinfochina.com 6. Or it could be a cipher, in which text is converted into other text using some algorithm. 或者可以是密码的形式,通过某种算法将某种文本转换为其他文本。 www.ibm.com 7. The One-Time Password takes advantage of the "one time one cipher" , which can keep from password detecting and transmission leaking. 一次性口令认证系统采用“一次一密”的方法能够有效地防止口令监听和传输泄露。 www.fabiao.net 8. Letters that are obvious to us become, to other eyes, a cipher as mysterious as the Rosetta Stone. 对我们来说清楚易懂的信件,在他人看来犹如罗塞塔石碑上的天书。 www.bing.com 9. In this paper, randomness evaluation of cryptography is studied and block cipher is selected as a research instance. 选择分组密码为实例,研究了对密码算法随机性的量化评估。 www.ceps.com.tw 10. Block cipher is an important branch of cryptography. Research on security of block cipher is an important direction. 分组密码是密码学的一个重要分支,分组密码的安全性研究成为一个重要的课题。 www.fabiao.net 1. For convenience, it details the chosen plaintext-timing attack implementation by way of example of DES block cipher algorithm. 为了便于说明,文中以分组密码DES算法为例,详述了选择明文-时间攻击的具体实现。 202.38.194.234 2. The propagation criterion is an important criterion of designing Boolean functions in block cipher. 扩散准则是分组密码中布尔函数设计的基本准则。 www.dictall.com 3. The difficulty of overcoming a public-key cipher may hold secret keys secure for a decade or more. 由于破解公开金钥加密法很困难,因此在未来10年甚至更久,密钥的安全性仍旧很高。 edba.ncl.edu.tw 4. Schneier provides a table showing relative encryption speeds of various block cipher algorithms in his. 中提供了一个表,其中展示了不同的块加密算法的相对加密速度。 www-128.ibm.com 5. They use a highly efficient symmetric cipher for the rest of their communication. 在余下的通信中,它们使用高效的对称口令。 www.ianywhere.com 6. Gets or sets the cipher mode used for XML encryption. 获取或设置XML加密所用的密码模式。 www.kuenglish.info 7. This ensures that even if the plain text contains many identical blocks, they will each encrypt to a different cipher text block. 这样确保了即使纯文本包含许多相同的块,这些块中的每一个也会加密为不同的密码文本块。 msdn2.microsoft.com 8. Cipher: Neo, there is an agent on your tail, you need to do as exactly as i say, you understand? 有个探员跟踪了你,你必须按照我说的去做,你明白吗? blog.sina.com.cn 9. Key: Key is a means of converting a plain-text into cipher-text and vice versa. 密钥:密钥是一种在明文与密文之间相互转换的方式。 www.ibm.com 10. You've just invented this great new cipher, and you want to do something with it. 你发明了一个很棒的密码算法,现在你想对它做点什么。 www.vipcareer.com 1. Similarly, the easiest way to compromise the security of a modern cryptographic cipher is to steal the key. 同样,危害现代加密的安全的最简单的方法是窃取密钥。 www-128.ibm.com 2. With the proposition of advanced encryption standard ( AES ), the block cipher mode of operation becomes a popular topic again. 随着高级加密标准AES的提出,分组密码工作模式的研究再度成为人们关注的热门问题。 dictsearch.appspot.com 3. after mainframe encrypts data stream by data cipher key, the encrypting data stream is transmitted to handset by bluetooth technology. 主机用所述数据密钥对数据流进行加密后,通过蓝牙技术将所述加密后的数据流发送至子机。 ip.com 4. In this paper, through DBMS CRYPTO, the authors introduce a general database encryption package CIPHER, based on an application example. 基于具体应用实例,介绍了利用DBMS_CRYPTO设计的一个数据库加密程序包CIPHER。 dictsearch.appspot.com 5. In the high security communication system, stream cipher as an important technique is widely used. 在高保密强度的通信系统中,流密码是一种广泛采用的重要技术手段。 lib.cqvip.com 6. With AES, blocks are encrypted independently such that two blocks of identical clear text produce identical cipher text results. 使用AES时每个块都单独加密,因此两个相同的明文块会生成相同的密码文本结果。 technet.microsoft.com 7. This paper introduces the principle and experiment of using optical system to realize the quantum cipher communication. 介绍以光学系统来实现量子密码通信的原理和实验。 www.dictall.com 8. Every morning the cipher clerk operating a Hagelin inside the embassy reset the wheels before beginning transmissions. 使馆内操作“哈盖林”机器的译电员每天早上在开始发报之前都重新给转轮定位。 dict.wenguo.com 9. Owing to the recurrent stoppages of work through the air raids, arrears had accumulated in the cipher branch. 由于在空袭中工作屡屡停顿,密码部门积压了许多未译的电报。 10. The popular RSA cipher algorithm, widely deployed in public-key cryptography, relies on factorization. 目前在公开金钥加密法中,最常用到的RSA密码演算法,就是应用因数分解的原理。 edba.ncl.edu.tw 1. Article 3 The State Encryption Administration shall take charge of administering the commercial cipher research throughout China. 第三条国家密码管理局主管全国的商用密码科研管理工作。 www.lawinfochina.com 2. This paper introduces an auto-alarming electronic cipher lock system designed with the AT89C2051 monolithic integrated circuit. 介绍了一种应用AT89C2051单片机设计的防盗自动报警电子密码锁系统。 www.chemyq.com 3. The block cipher mode encodes data one block at a time. 块密码模式一次一块对数据进行编码。 msdn2.microsoft.com 4. With this cipher option String approach, there is no type-safety to ensure you're using valid options. 这种字符串方式的cipher选项,并没有类型安全以确保你正在用有效的选项。 www.infoq.com 5. The stream cipher mode encodes data one bit at a time. 流密码模式一次一位对数据进行编码。 www.kuenglish.info 6. The method can also somewhat reflect the resistance ability of a block cipher to integral attack. 该检测方法可以一定程度地反映出分组密码抵抗积分攻击的能力。 www.dictall.com 7. The hybrid cipher system can be used widely in thee-commerce, the secure instant messaging, the secure email, etc. 该混合加密模拟系统适用于电子商务、安全即时通信、安全电子邮件等多种应用场合。 www.fabiao.net 8. The cipher byte array is then decrypted, and the decrypted byte array is returned as a text string. 接着对该密码字节数组解密,解密的字节数组作为文本字符串返回。 www.ibm.com 9. The cipher used to encrypt files is the inherited cipher. 用于加密文件的密码是继承而来的密码。 www.ibm.com 10. The exhaustion still was to the block cipher practical attacklead. 穷举仍然是对分组密码的实用的攻击主角。 www.pklei.com 1. Represents the cipher mode used in the symmetric algorithm. 表示对称算法中使用的密码模式。 www.kuenglish.info 2. We then provide tow constructions, HCBC and HPCBC, based on a given block cipher E and a family of AXU functions. 基于一个给定的分组加密和一个AXU函数族,我们给出了HCBC和HPCBC这两种构造方法。 www.fabiao.net 3. In cryptography , a product cipher developed by IBM that formed the basis of DES. It used 128-bit data blocks and a 128-bit key. 在密码学中,由IBM公司开发的一种乘积密码,后成为DES的基础,它使用128位数据块和一个128位的密钥。 dict.veduchina.com 4. Specifying a cipher suite in this manner overrides any cipher suites that are associated with the specifed Security Level. 以这种方式指定的密码套件将覆盖与指定的安全级别关联的任何密码套件。 www.ibm.com 5. The Foreign Office have been pushing us for months to get something on the cipher . 好几个月来,外交部一直在催我们要从密码中了解到一些情况。 dict.veduchina.com 6. INFORMATION PROCESSING. MODES OF OPERATION FOR A 64-BIT BLOCK CIPHER ALGORITHM. 信息处理.计算机制图.64位字组码算法的操作方法 www.mapeng.net 7. In this paper we study the feedforward stream cipher on analysis and design which are two contrary directions. 该文从分析和设计两个不同的角度研究了前馈流密码系统。 www.lw23.com 8. Software implementation. 2. Investigate and study the history and current situation of symmetric cipher s algorithms . 调查研究了对称密码算法暴力破解的历史和现状。 www.fabiao.net 9. If a bit in the cipher text is mangled, one plain text bit is mangled and the shift register is corrupted. 如果密码文本中有一个位出错,则一个纯文本位出错,并且移位寄存器损坏。 msdn2.microsoft.com 10. At last they managed to puzzle out the meaning of the cipher. 最后他们终于弄清楚这符号是什么意思。 zhidao.baidu.com 1. Could you get me out of this cipher? 你能将我从这密码中解放吗? zhidao.baidu.com 2. I can't bear such a cipher any longer. 我再也不能忍受这样一个无用的人了。 e.3edu.net 3. A generally simple mechanism whereby plain text characters are replaced with other characters to form the cipher text. 使用其它字符替换明文字符以形成密文的一种常用简单机制。 www-128.ibm.com 4. A simple way to check whether SSL is configured is to deliberately mismatch your WMQFTE and queue manager channel cipher suites. 检查是否配置SSL的一个简单方法是故意使您的WMQFTE和队列管理器通道CipherSuites不匹配。 www.ibm.com 5. The analysis of SMCAC is given, and the results show that the variant of this cipher is very insecure under chosen-plaintext attacks. 对SMCAC进行密码分析,结果表明,CAC的这种变形在选择明文攻击下是极不安全的。 www.dictall.com 6. The default is STRONG, which means that CICS can use all of the cipher suites to negotiate with clients. 默认值是STRONG,这意味着CICS可以使用所有密码组合来与客户端协商。 www.ibm.com 7. Substitution box (S-box) is an important component in the block cipher. 置换盒又称为S盒,是分组密码中常采用的重要部件。 www.ceps.com.tw 8. Cryptography will be spread for the cipher text to achieve copyright protection. 密码技术将被保护对象加密为密文进行传播,实现版权保护; www.fabiao.net 9. However, block cipher algorithms tend to execute more slowly than stream ciphers. 但是,块密码算法执行起来通常比流密码慢。 msdn2.microsoft.com 10. A cipher together with all possible plain texts, cipher texts, and keys. 密码以及所有可能的明文、密文和密钥。 www-128.ibm.com 1. Study on Comparison Between Cipher Component of Hardware and Software. 硬件密码组件与软件密码组件的比较研究。 carsglobal.cn 2. Using these cipher suites the data is encrypted by one end and decrypted by other end. 使用该密码组合时,数据在一端进行加密,在另一端进行解密。 www.ibm.com 3. This significant teleplay held a lot of Liu's dreams, which told a story on Chinese secret agent uncovering cipher telegram. 这部非凡的电视剧包含了柳云龙的很多梦想。它讲述了中国特工人员解了密的密码电报的故事。 hi.baidu.com 4. If the hashing cipher is run through code a second time and the message digest changes, it means the code changed after being signed. 当再一次对该代码应用此散列密码时,如果产生的消息摘要发生变动,则意味着经签名后的代码发生了变动。 www-128.ibm.com 5. Next I create a Cipher class object and initiate it in encryption mode. 接着创建Cipher类对象,并以加密方式对它初始化。 www.ibm.com 6. Recall from my earlier discussion that CBC asks for cipher-block chaining. 回想在前面的讨论中说过,CBC要求密文块链接。 www.ibm.com 7. It accepts a Base 64 encoded cipher byte array, and decodes and decrypts it to return the clear data string. 它接受用Base64编码的密码字节数组,并对它译码和解密以返回明文数据字符串。 www.ibm.com 8. Unfortunately, prior to V7, the default SSL cipher selection of strong includes some notably weak ciphers. 遗憾的是,在V7之前,默认的SSL强密码选择包含一些明显非常弱的密码。 www.ibm.com 9. The article uses the Caesar cipher tool as sample program for later discussion. 在后面的讨论中,以Caesar密码工具作为示例程序。 www.ibm.com 10. Cipher modes define the method in which data is encrypted. 密码模式定义对数据进行加密所采用的方法。 msdn2.microsoft.com 1. This is a cipher, an air sandwich. 这等于零,一个空中三明治。 www.hjenglish.com 2. Defines the possible cipher algorithms for the. 类定义可能的密码算法。 msdn2.microsoft.com 3. Describe your cipher using standard notation. 使用标准的记号描述你的密码算法。 www.vipcareer.com 4. Encryption with stream cipher is the main arithmetic in digital image encryption based on chaos. 基于混沌的数字图像加密算法中,序列流式加密算法是主流研究方向。 www.fabiao.net 5. It can properly satisfy the needs of practice of IC design, embed operating system as well as Logic Analyzer and Cipher Coprocessor. 可作为逻辑分析仪、密码协处理器使用,也可用于信息安全、IC设计、嵌入式操作系统等有关的研究、开发和实验。 www.dictall.com 6. In consideration of security and performence, uses stream cipher for encryption. 处于安全性和效率的考虑,所有加密均采用流加密。 www.xactad.org 7. The nature of the cipher is a fascinating theoretical question. 表音密码的性质是个令人着迷的理论性问题。 xsd82615788.blog.163.com 8. This may result that a block cipher with time and counter parameters is secure even with cases that the number of round is largely reduced. 这也许会导致这类带有时间组号参数的分组算法在减少迭代轮情况下仍然是安全的。 www.ceps.com.tw 9. Sure. Please sign your name here and here, and then, your account number is . . . . . . , and the cipher code is 401128. 当然。请把您的名字签在这或这儿。您的账号是……,密码是401128。 www.china-handan.gov.cn 10. for a big bit hash , try using a symmetric cipher adapted to perform hashing. 对于大位数杂凑,尝试使用适合于执行杂凑法的对称加密术。 www.ichacha.net 1. In data ciphering, it adopts improved ECC to cipher and decipher data. 数据加密方面,用改进的ECC对数据加解密。 www.fabiao.net 2. Julius Caesar, for example, is known to have employed a simple substitution cipher to protect messages from unauthorized viewers. 例如传说中恺撒大帝就曾使用简单的替换加密来防止未经授权者读懂消息。 www-128.ibm.com 3. Since the 1980s, more and more attentions have been given to constructing a cipher system with digital chaotic system. 二十世纪80年代以来,用数字化混沌系统构造密码系统受到了越来越多的关注。 www.fabiao.net 4. The data cipher card supports kinds of network protocols to satisfy the requirement of the application of commercial cryptology. 它支持多种网络安全协议,以满足商用密码应用中的数据安全保密的需求。 www.fabiao.net 5. In the paper, cipher algorithm is not only used to implement encryption and decryption but also used to source authentication. 密码算法在本文中不仅被用作实现加密解密,而且被用于实现身份的认证。 www.fabiao.net 6. A Cipher class object is created and initiated in the decryption mode. 这样就用解密方式创建并初始化了Cipher类对象。 www.ibm.com 7. This can prevent the crime of robbing cipher effectively. 可有效地防范暴力获取密码的犯罪。 ip.com 8. The cipher object will perform the actual DES-CBC operations. 这个cipher对象将执行实际的DES-CBC操作。 www.ibm.com 9. The cipher text string is then passed to the getCipherDataDoc private method. 接着该密码文本字符串传递给getCipherDataDoc私有方法。 www.ibm.com 10. Specifies the block cipher mode to use for encryption. 指定用于加密的块密码模式。 www.kuenglish.info 1. This USB Cipher Card adopts USB2. 0 standard, and adopts FPGA design technology, and imports embedded USB host technology. 该USB加密卡采用了USB2.0接口标准,采用了FPGA设计技术,引入了嵌入式USB主机技术。 www.edu-hb.com 2. I have provided support for the TripleDES block cipher algorithm only for demonstration. 我已经对TripleDES块密码算法提供了支持,但只用于演示。 www.ibm.com 3. I see about two new cipher designs from amateur cryptographers every week. 每周,我都能看到大约两个来自爱好者的新的密码设计。 dictsearch.appspot.com 4. It is based on double queues which allow the encryption and decryption of AES_CBC cipher to work on the same high speed. 在解密中采用了双队列技术,实现了报文解密和子密钥展开协调工作,提高了解密速度。 www.fabiao.net 5. A stream cipher encryption scheme was designed based on piecewise nonlinear chaotic map. 基于分段非线性混沌映射设计了一种流密码加密方案。 www.joca.cn 6. The RC2CryptoServiceProvider object is a block cipher that encrypts and decrypts data in blocks of 8 bytes. RC2CryptoServiceProvider对象是一个加密和解密8字节数据块的块密码。 msdn2.microsoft.com 7. RC4 is a stream cipher algorithm operating on each byte of data; like the RC2, it supports key lengths of 40 bits, 64 bits, and 128 bits. RC4是一个流密码算法,它对数据的每个字节进行操作;和RC2一样,它支持长度为40位、64位和128位的密钥。 www.ibm.com 8. A device for translating plain text into cipher. 一种将简单的文体译成密码的装置。 dict.hjenglish.com 9. The cipher message begins with a large 534, does it not? 这封密码信,开始是一个大534,不是吗? hi.baidu.com 10. The IV is then separated from the actual cipher byte array. 接着将IV与真正的密码字节数组分离。 www.ibm.com 1. Please input the cipher code will register. 请输入要注册的密码。 www.gzgangshun.com 2. It shifts the letter in the plain message n character backwards to get the cipher text. 它把明文消息中的字母向后偏移n个字符,从而产生密文文本。 www.ibm.com 3. Therefore, it is very necessary to develop the high speed cipher card based on the native cipher algorithm. 因此,研制开发基于国产密码算法的高速数据密码卡是十分必要的。 www.fabiao.net 4. I have declared a byte array named ivBytes, which will hold the initial vector bytes for each step of the cipher block chaining. 我声明了一个名为ivBytes的字节数组,它将包含密码块链接每一步的初始矢量字节。 www.ibm.com 5. If you have duplicate blocks within your plain text stream, you will have duplicate blocks within your cipher text stream. 如果您的纯文本流中有重复块,则您的密码文本流中也会有重复块。 technet.microsoft.com 6. Later will design the block cipher all corrected this shortcoming. 5. 以后设计的分组密码全部纠正了这个缺点。 www.pklei.com 7. I then re-initialize the cipher with the new iv object. 然后我用新的iv对象重新初始化这个密码。 www.ibm.com 8. Every cipher must be Base 64 encoded before it can be inserted into an XML document. 在可以将每个密码插入到XML文档之前,它们都必须用Base64编码。 www.ibm.com 9. Cryptograph: a system of secret or cipher writing; a cipher. 密码:一种秘密的或用密码书写的系统;密码。 dict.hjenglish.com 10. The chaotic output-cipher feedback mode (OCFM) stream cipher was developed to resist attacks based on chaotic orbits. 针对利用混沌轨道信息的密码分析,设计了一种输出-密文混和反馈模式的混沌流密码。 www.ceps.com.tw 1. Its cipher code is basically the golden standard of Internet security, and it doesn't sell subscriber lists. 它的密码在网络安全上可称得上是金牌标准,而且它不出售用户名单。 www.chinaedu.com 2. But what is the use of a cipher message without the cipher? 可是没有密码本,密码信又有什么用呢? hi.baidu.com 3. The mode of encryption is CBC (Cipher Block Chaining) with 8-byte block size. 加密方式是块大小为8字节的CBC(CipherBlockChaining,密码块链接)。 www.ibm.com 4. The cipher text and the IV are then transmitted via radio. 然后,密文和IV通过无线电发送。 www-128.ibm.com 5. The process of transforming cipher text into plain text. 将密文转换成明文的过程。 www-128.ibm.com 6. The process of transforming plain text into cipher text. 将明文转换成密文的过程。 www-128.ibm.com 7. This scheme doesn't need security channel to transmit proxy cipher key, and has properties of unforgeability and unlinkability. 该方案不需要安全信道传送代理密钥,且具有不可伪造性、不可链接性。 kns50.chkd.cnki.net 8. Next, I pass the DESEngine object to the CBCBlockCipher constructor to create a CBCBlockCipher object named cipher. 然后,我将这个DESEngine对象传递给构造函数CBCBlockCipher以创建一个名为cipher的CBCBlockCipher对象。 www.ibm.com 9. Longer hash lengths are likely to require some coding in order to adapt a symmetric cipher. 更长的杂凑长度很可能要求进行一些撰写程式来适应对称加密术。 www-128.ibm.com 10. Need to use a Block Cipher for streaming operations? 需要为流操作使用块加密器(BlockCipher)? www.infoq.com 1. She's cool because she's unknowable, a cipher. 她酷,因为她神秘莫测,因为她是个等待解答的密码。 www.bing.com 2. Because of this, a block of plain text will always return the same cipher text when encrypted with the same key and algorithm. 因此,当用同样的密钥和算法加密时,纯文本块总是返回同样的密码文本。 msdn2.microsoft.com 3. Switch to the SSL tab view, and specify a cipher specification (in this case, use RC4_MD5_US). 切换到SSL选项卡视图,然后指定一个密码规范(在这个例子中使用RC4_MD5_US)。 www.ibm.com 4. The Caesar cipher is easy to break. 凯撒密码很容易破解。 www.ibm.com 5. You must use a certificate that matches the cipher suite you choose. 必须使用与您选择的口令组匹配的证书。 www.ianywhere.com 6. A system of secret or cipher writing ; a cipher. 一种书写的保密方法。 dict.veduchina.com 7. Cipher, you're almost in lock-on range! 快进入你的有效射程了! bbs.a9vg.com 8. Aim How to produce non-periodic sequence cipher by seed key. 目的由种子密钥生成非周期密码序列。 www.dictall.com 9. I was a cipher in this company. 在这群人中,我是一个微不足道的小角色。 tr.bab.la 10. In the IPCONN and TCPIPSERVICE definitions in the CICSB region , set the cipher related attributes. 在CICSB区域的IPCONN和TCPIPSERVICE定义中,设置与密码相关的属性。 www.ibm.com 1. and the cipher was waiting. 之后便发现了密码 www.kekenet.com 2. And then compile it and run it to cipher the message in hello. txt. 然后,编译这个程序并运行它来加密hello.txt中的消息。 www.ibm.com 3. They couldn't cipher out how she got there. 他们琢磨不出她是怎样到的那里。 4. The government uses a special cipher so that official messages are kept secret. 政府使用一种特殊密码,官方电讯因此得以保密。 www.hotdic.com 5. Need to create an AES 256-bit Cipher to secure data? 需要创建一个AES256位Cipher来保护数据? www.infoq.com 6. I am now ready for cipher block chaining. 现在可以进行密文块链接了。 www.ibm.com 7. You do not have to open the key immediately before decrypting the cipher text. 不必只在解密密码之前才打开密钥。 msdn2.microsoft.com 8. Second, it approaches the main theory and technology of block cipher, and analyzes some important block ciphers such as DES & AES(Rijndael). 其次,详细地探讨与分析了分组密码的主要理论与技术,其中对当前国内外一些重要的分组密码进行了研究与分析。 www.fabiao.net 9. If you don't specify this, the ripemd160 digest and aes-128 cipher will be used. 如果没有进行这个指定,将使用ripemd160摘要和aes-128密码。 www.ibm.com 10. He is a mere cipher in our company. 他在我们公司纯粹是个无用之人。 edu.sina.com.cn 1. Cipher: I do't know how those come. 我不知道这些东西是怎么来的。 blog.sina.com.cn 2. To write(a message, for example) in code or cipher. 译成密码用电码或密码书写(如,信息) www.jukuu.com 3. The software design of real-time communication between the electronic payment cipher instrument and computer 电子支付密码器与计算机实时通信的软件设计 service.ilib.cn 4. Research and Implementation of the Chaotic Stream Cipher-based Network Information Cryptography System 基于混沌序列密码的网络信息加密系统 www.ilib.cn 5. Theoretical Study of Three Major Cipher Systems and Problems Occurring in the Application of Them 三大密码体制的理论研究及应用中的问题 www.ilib.cn 6. Research and Implementation of a Block Cipher for Database Encryption System 一个用于数据库加密分组加密算法的研究与实现 www.ilib.cn 7. A Changeable S-box-based Block Cipher Algorithm and Its Application to Multimedia Gateway Controller 基于可变S盒的分组密码算法及其在媒体网关中的应用 www.ilib.cn 8. a first random number is generated and the cryptographic key is used for encrypting the first random number to obtain a cipher text; 产生第一随机数,用所述密钥加密所述第一随机数得到密文; ip.com 9. Reconfiguration Mode and its Influence on Performance in Reconfigurable Cipher Processing 可重构密码处理结构中重构机制及对性能的影响 www.wanfangdata.com.cn 10. Generation and Improvement of a Chaotic Cipher Sequence 一种混沌密码序列的产生及其改进 service.ilib.cn 1. Provisions on the Administration of Production of Commercial Cipher Products [Effective] 商用密码产品生产管理规定[现行有效] www1.lawinfochina.com 2. Chaos Stream Cipher Algorithm of Mathematical Formulae and Chemical Reaction Equations 数学公式和化学反应式的混沌序列加密算法 www.ilib.cn 3. The State-of-The-Art of Research on Block Cipher Mode of Operation 分组密码工作模式的研究现状 www.ilib.cn 4. Implementation and application of a cipher chip 一种加密芯片的实现和应用 service.ilib.cn 5. Researching on the Block-Cipher for Parallelizable Message Authentication Code 并行信息认证代码在分组密码中的应用 service.ilib.cn 6. mainframe generate data cipher key according to the register cipher key, and completes authentication identification with handset; 主机根据所述注册密钥生成数据密钥,并完成与子机之间的鉴权认证; ip.com 7. Competition contest for European Stream-cipher Encryption Standard 欧洲流密码加密标准的竞评 www.ilib.cn 8. The Applications of Differential Cryptanalysis in Sequence Cipher Attack 差分分析在序列密码攻击中的应用 www.ilib.cn 9. cipher needs to completely obscure statistical properties of original message 加密需要完全弄乱原始消息的统计信息 wenku.baidu.com 10. Provable Security to One Kind of Hash Function Constructed by Block Cipher's CMAC Mode 分组密码算法链接模式构造单向函数的可证安全性 www.ilib.cn 1. Pseudo-Random Bit Generator Based on Coupled Logistic Maps and its Applications in Chaotic Stream-Cipher Algorithms 基于耦合Logistic映射的伪随机位发生器及其在混沌序列密码算法中的应用 www.ilib.cn 2. Counter mode with Cipher-block chaining Message authentication code Protocol 计数器模式密码块链信息认证码协议 www.networkdictionary.cn 3. Research into applied software cipher encryption algorithm 应用软件密码加密算法研究讨 scholar.ilib.cn 4. The Application of Cipher Technique in the Satellite Tracking Telemetering and Command 密码技术在卫星测控中的应用 www.ilib.cn 5. Research and implementation of the block cipher algorithms 分组密码算法的研究与实现 www.ilib.cn 6. A Multilateral Asymmetric Key Cipher Algorithm Based on RSA and Its Application in Varied Digital Signatures 基于RSA的多元非对称密码系统在数字签名中的应用 www.ilib.cn 7. The Statistical Performance Test and It's Implementation Applied to Block Cipher Algorithm 分组密码统计性能测试的方法及算法 www.ilib.cn 8. Key management of symmetrical cipher system on network communication 网络通讯中基于对称密码体制的密钥管理 www.ilib.cn 9. Realization of GM Probabilistic Encryption Cipher System GM概率加密密码系统的实现 service.ilib.cn 10. Symmetrical Permutation Design in Block Cipher Algorithm 分组密码对称置换算法设计 www.ilib.cn 1. Semantics Analysis of Biological Sequences and Explore of Second Cipher Rules 生物序列的语义分析与第二密码规则的探索 service.ilib.cn 2. Aiming at security threats of cipher, analyze cipher security in satellite network according to characters of satellite network; 针对加密算法面临的安全威胁,结合卫星网络的特点,对加密算法在卫星网络中的安全性进行了分析; www.xactad.org 3. CCM: Counter mode with Cipher-block chaining Message authentication code 计数器模式及密码区块链信息认证码 wiki.networkdictionary.cn 4. Finally, Firefox sent out one last unencrypted message, a " Change Cipher Spec" record 最后Firefox发出最后一条没加密的消息,一个“ChangeCipherSpec”记录 www.infoq.com 5. Study on a Novel Feedback Chaotic Block Cipher Algorithm Using External Key 一种利用外键控制的密文反馈混沌分组密码算法研究 service.ilib.cn 6. Design of chaotic output-cipher feedback stream cryptosystems 输出-密文混和反馈混沌流密码的设计 www.ilib.cn 7. DES Data Cipher-appending Algorithm in Network Communication 浅析网络通讯中的DES加密算法 ilib.cn 8. Analysis and Discussing of Cipher Algorithm of Network-bar Manage Software 网吧管理软件密码算法分析与探讨 service.ilib.cn 9. Reliable Cipher Key Transport Protocol for Secure Multicast 安全多播中可靠的密钥传送协议 www.ilib.cn 10. Analyses of public key cipher and its data expanding rate 背包公钥密码及其数据膨胀率的分析 www.ilib.cn 1. A Study on the Step Control Mode of Electromagnetic Micromotor in MEMS-cipher-lock System MEMS密码锁的驱动电磁型超微电机步进控制研究 ilib.cn 2. Partition linear cryptanalysis for block cipher 分组密码的分区线性分析法 www.ilib.cn 3. Set authentication password cipher huawei 设置密文口令 bbs.chinaunix.net 4. Optimization design of linear mapping component in block cipher 分组密码中线性映射硬件的优化设计 www.ilib.cn 5. On the Algorithm of Public Key Cipher and the Analysis of its Safety 公钥密码算法及其安全性分析 www.ilib.cn 6. Study on the Step Control Mode of Electromagnetic Micromotor in MEMS-cipher-lock MEMS密码锁的驱动电磁微电机步进控制研究 service.ilib.cn 7. Development and Comment of Symmetric Key Block Cipher Modes of Operation 分组密码工作模式发展动态及简评 service.ilib.cn 8. Brute force attack on cipher algorithms uses mainly two methods: (1) Hardware implementation; 暴力破解密码算法主要有两种实现方法:(1)硬件实现; www.fabiao.net 9. CBC-MAC Cipher block chaining message authentication code 密码块链消息鉴权码 wenku.baidu.com 10. Dynamic Cipher Application in the Privacy Information System 动态密码在保密信息系统中的应用 www.ilib.cn 1. Analysis of multi-access performance on block cipher based FH sequences 基于分组密码的跳频序列多址接入性能分析 www.ilib.cn 2. On detail implementing procedures and applications of cipher box in AES AES密码盒算法的详细实现过程及其应用 www.ilib.cn 3. Burst transceiver, one shot pad for cipher code, or secret writing devices; 突发式收发报机,一次性密码本、密写工具; cq.netsh.com 4. Stream Cipher Algorithms Based on Composite Nonlinear Discrete Chaotic Dynamical Systems 基于复合离散混沌动力系统的序列密码算法 www.ilib.cn 5. Research on the RSA Public-Key Cipher Algorithm and Secret Sharing Problem 公开密钥密码算法和密钥共享问题的研究 ilib.cn 6. Differential and Linear Cryptanalysis of AC Block Cipher AC分组密码的差分和线性密码分析 service.ilib.cn 7. CMAC Cipher-based message authentication code 基于加密的消息鉴权码 wenku.baidu.com 8. An Implement of Elliptic Curve Cryptography Cipher Card 一种椭圆曲线密码卡的设计与实现 www.ilib.cn 9. Parallel Processing Model of the Block Cipher 分组密码的并行工作模式 service.ilib.cn 10. Algorithm Structure and Security of RSA Public Key Cipher System RSA公钥密码系统算法结构及其安全性 www.ilib.cn 1. A New Symmetry Block Cipher Algorithm Using Interweaving 一种采用交织的新型对称分组密码算法 www.ilib.cn 2. An introduction to the novel technology for designing cipher algorithm chip 密码算法芯片设计新技术介绍 www.ilib.cn 3. Cipher Technology and Cipher Keys Management 密码技术及密钥管理 www.ilib.cn 4. Application and analyzes about stream cipher 序列密码应用分析 www.ilib.cn 5. Module Protected Chip Design of Block Cipher Algorithm 分组密码算法芯片的模块保护设计 www.ilib.cn 6. Word-Oriented Memorable Logics in Stream Cipher Design 序列密码设计中的整字带记忆逻辑 www.ilib.cn 7. Cryptography with no Transmission Error or Cipher-Text Extension Based on Orthogonal Table 基于正交表的双无规范密码方案 www.ilib.cn 8. Applications of cipher technology in digital countfeint system 密码技术在数字防伪系统中的应用 service.ilib.cn 9. Design and Realization of a Kind of Electronic Cipher Lock by VHDL 一种基于VHDL的电子密码锁的设计与实现 www.ilib.cn 10. Study on a Method of Strengthening the Security of Block Cipher 一种分组密码强化安全方法的研究 ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。