网站首页  词典首页

请输入您要查询的英文单词:

 

单词 cipher
释义
ciphers是cipher的复数

cipher

美 [?sa?f?r]
英 [?sa?f?(r)]
  • n.密码;零〔即0〕;数码;密码索引
  • v.计算;〔美口〕算出;运算;用密码书写
  • 网络密码算法;密码组合;算法数
复数:ciphers  现在分词:ciphering  过去分词:ciphered  
n.
cipher key
n.
1.
零〔即0〕
2.
数码,阿拉伯数字
3.
暗号,暗码,密码;密码索引
4.
(姓名首字母的)组合字,花押字
5.
【音乐】(风琴出毛病时的)连响
6.
无价值的人[物];无足轻重的人,微不足道的小角色
7.
代号
8.
水印
1.
零〔即0〕
2.
数码,阿拉伯数字
3.
暗号,暗码,密码;密码索引
4.
(姓名首字母的)组合字,花押字
5.
【音乐】(风琴出毛病时的)连响
6.
无价值的人[物];无足轻重的人,微不足道的小角色
7.
代号
8.
水印
v.
1.
计算;〔美口〕算出;运算
2.
用密码书写

例句

释义:
1.
Semi-weak keys are pairs of keys that result in ciphers that are easy to break.
半弱密钥是产生的密码容易被破解的密钥对。
msdn2.microsoft.com
2.
Weak keys are keys that result in ciphers that are easy to break.
弱密钥是所生成的密码容易被破解的密钥。
msdn2.microsoft.com
3.
As you can see, working with JDK Ciphers is quite a cumbersome task.
如你所见,使用JDKCipher是一项相当繁重的任务。
www.infoq.com
4.
As the only nonlinear component in most block ciphers, S-box is responsible for the security of block ciphers.
S盒是许多分组密码算法中唯一的非线性部件,它的密码强度决定了整个密码算法的安全强度。
www.ceps.com.tw
5.
Typically, secret-key algorithms, called block ciphers, are used to encrypt one block of data at a time.
通常,私钥算法(称为块密码)用于一次加密一个数据块。
msdn2.microsoft.com
6.
Such ciphers permit length-preserving encryption of a data stream with only a single pass through the data.
这些加密方法使得对只有单一输入数据的数据流实施保持长度不变的加密成为可能。
www.fabiao.net
7.
Shiro tries to simplify the entire concept of cryptographic ciphers by introducing its CipherService API.
Shiro通过引入它的CipherServiceAPI试图简化加密密码的整个概念。
www.infoq.com
8.
ssh and its variants provide stronger authentication mechanisms and encrypt all traffic using your choice of several ciphers.
ssh及其变种提供了更强的身份验证机制,并使用您所选择的几个密码对所有的通信内容进行加密。
www.ibm.com
9.
Note that not all of the digest and ciphers here are supported, but your OpenSSL must support the cipher and digest that you want to use.
注意,并非这里的所有摘要和密码都受到支持,但您的OpenSSL必须支持您想要使用的密码和摘要。
www.ibm.com
10.
DES consequently came under intense academic scrutiny, and motivated the modern understanding of block ciphers and their cryptanalysis .
DES因此遭到激烈学术审议,激励现代理解分组密码及密码翻译法。
dictsearch.appspot.com
1.
For this traffic to be best protected, strong cryptographic ciphers should be used.
为了更好地保护通信流,应该使用强密码。
www.ibm.com
2.
A new type of coder for the system is designed using M-sequence as question and answer ciphers .
设计了一种以M序列为询问、应答码的密码器。
dictsearch.appspot.com
3.
People occasionally design strong ciphers. Amateur cryptographers even design strong ciphers.
人们偶尔能设计出强的密码算法,爱好者也可以设计强的密码算法。
dictsearch.appspot.com
4.
In popular symmetric ciphers, the S-box substitution is the core operation that dominates the execution of cryptographic algorithms.
盒代换是大多数对称密码算法的核心操作,加快S盒代换是提高密码编码处理速度的关键。
www.dictall.com
5.
Unknowns can become knowns by publishing cryptanalysis of existing ciphers ; most conferences accept these papers.
不知名的作者可以通过发表对现有密码算法的分析文章来出名,大多数会议接受此类论文。
dictsearch.appspot.com
6.
Consider your decision carefully; setting ssl_ciphers to NULL effectively disables encryption.
慎重考虑您的决定:将ssl_ciphers设置为NULL就可以禁用加密。
www.ibm.com
7.
Ciphers are more convenient than codes in some situations, there being no need for a codebook.
有些情况下,“密码”比“编码”更方便,因为“密码”无需反复查询密码本。
dictsearch.appspot.com
8.
the ability of self-synchronous chaotic ciphers to resist the divide-and-conquer attack is weaker than that of synchronous chaotic ciphers.
因而自同步混沌密码比同步混沌密码的抗分割攻击能力更弱。
www.juyy.net
9.
Block ciphers' security mostly depends on S box that is the only non-linear structure in most block ciphers.
分组密码的安全性很大程度上取决于分组密码中唯一的非线性结构S盒。
www.dictall.com
10.
While it will not be covered here, you should also ensure that your Web server is configured to only accept traffic using strong ciphers.
尽管这里不详细讨论,但是还应该确保把Web服务器配置为只接受使用强密码的通信流。
www.ibm.com
1.
The academic literature is littered with the carcasses of ciphers broken by their analyses.
学术文献里被他们的分析而攻破的密码算法可以说是尸横遍野。
dictsearch.appspot.com
2.
In order to resist algebraic attacks, Boolean functions used in many stream ciphers should have optimum algebraic immunity.
为了有效地抵抗代数攻击,密码系统中使用的布尔函数必须具有最佳的代数免疫。
www.jsjkx.com
3.
Namely finally realizes the infrared long-distance remote control which the numerical ciphers lock.
即最终实现数字密码锁的红外线远程遥控。
goabroad.zhishi.sohu.com
4.
The experimental results show that NDF-CKG has low cost and high speed, and can be used instead of LFSR in conventional stream ciphers .
研究表明:NDF-CKG具有高安全性,低成本和高速度的特点,可作为流密码设计中的核心组件。
dictsearch.appspot.com
5.
If you wish, you can use the pick list to specify precisely the ciphers to use, but this isn't usually necessary.
如果您愿意,还可以使用选择列表来更准确地指定要使用的密码,但这通常是不需要的。
www.ibm.com
6.
However, block cipher algorithms tend to execute more slowly than stream ciphers.
但是,块密码算法执行起来通常比流密码慢。
msdn2.microsoft.com
7.
Normally, clients select strong ciphers implicitly if the Web server supports them, but it is best to be sure.
正常情况下,如果Web服务器支持强密码,客户机会隐式地选择强密码,但是最好确保这么做。
www.ibm.com
8.
Banking. Key management (retail). Part 2 : key management techniques for symmetric ciphers.
银行业务。键控管理(零售)。第2部分:对称密码用键控管理技术。
chinafanyi.com
9.
The SSLCipherspecs attribute accepts a string of two byte ciphers.
SSLCipherspecs属性接受一串两字节的密码。
www.ibm.com
10.
Unfortunately, prior to V7, the default SSL cipher selection of strong includes some notably weak ciphers.
遗憾的是,在V7之前,默认的SSL强密码选择包含一些明显非常弱的密码。
www.ibm.com
1.
I guess this must be a book of ciphers.
其实我猜它就是个密码本。
www.hellomandarin.com
2.
Cryptography is the study of protecting information through the use of codes and ciphers.
密码学是一门研究如何通过使用代码和密码来保护信息的学科。
technet.microsoft.com
3.
You can determine the list of ciphers and message digest formats supported by using openssl help, as shown here in Listing 1.
可以通过openssl帮助确定受支持的密码和哈希格式列表,如清单1所示。
www.ibm.com
4.
Block ciphers use the same encryption algorithm for each block.
块密码对每个块使用相同的加密算法。
msdn2.microsoft.com
5.
Block ciphers with long keys are stronger than stream ciphers.
使用长密钥的块密码比流密码更强。
www.juyy.net
6.
In this case, there's an antidote: cryptography, the use of codes and ciphers to protect information.
在这种情况下,有一种解决办法:密码学,用密码保护信息。
www.wangxiao.cn
7.
is a type of cryptanalytic attack against block ciphers.
是一种用来对付分组密码的密码分析手法。
instapedia.com
8.
Is it enough to break the Enigma ciphers used by Nazi Germany in the Second World War?
破解二战时德国纳粹使用的谜机密码就够了吗?
www.bing.com
9.
Banking. Key management (retail). Part 3 : key life cycle for symmetric ciphers.
银行业务。键控管理(零售)。第3部分:对称密码用键控寿命周期。
chinafanyi.com
10.
"The best cryptographers around" break a lot of ciphers.
“圈子里最好的密码学家”攻破了很多密码算法。
dictsearch.appspot.com
1.
Ideally, cryptographers should only look at ciphers that have a reasonable chance of being secure.
理想情况下,密码学家只会看那些有合理的机会成为安全算法的东西。
dictsearch.appspot.com
2.
You should remove those ciphers or a client might select one of them.
应该删除这些密码,否则客户机可能会选用它们。
www.ibm.com
3.
Workaround: Enable strong ciphers (128-bit or higher) in your Web server software.
处理:在网络服务器软件中打开强密码(128位或更高)
www.cnblogs.com
4.
Ciphers are cryptographic algorithms that can reversibly transform data using a key.
加密是使用密钥对数据进行可逆转换的加密算法。
www.infoq.com
5.
The study and application of Ciphers that use a single secret key for both encryption and decryption operations.
使用单个密钥执行加密和解密操作的密码算法研究和应用。
kajaa.bbs.us
6.
But I have encrypted this letter with one of our most esoteric ciphers . Its words are safe from these yokels.
但我用了我们最深奥的密码来撰写这封信的具体内容,所以由这些乡巴佬送信是非常安全的。
dictsearch.appspot.com
7.
You learned how to create encrypted files and directories and how to change ciphers and inheritance through commands.
您了解了如何创建加密的文件和目录,以及如何通过各种命令来更改密码和继承。
www.ibm.com
8.
nb. &nb. One followed by two ciphers is 100.
一的后面跟两个零是一百。
dictsearch.appspot.com
9.
Until now, feminism has been the best thing that ever happened to us, because it means we get to sleep with people rather than ciphers .
迄今,女权运动是发生在我们身上最好的一件事,因为那意味着和我们睡觉的是人而不是傀儡。
dictsearch.appspot.com
10.
Second, it approaches the main theory and technology of block cipher, and analyzes some important block ciphers such as DES & AES(Rijndael).
其次,详细地探讨与分析了分组密码的主要理论与技术,其中对当前国内外一些重要的分组密码进行了研究与分析。
www.fabiao.net
1.
You should set this to HIGH (this is the default) to limit the acceptable ciphers unless you have a good reason not to.
您应该将其设置为HIGH(这是缺省值)以限制可接受的密码,除非您有很好的理由不这么做。
www.ibm.com
2.
Experimental Study of Different Parameters on Chaotic Stream Ciphers for Information Encryption
信息加密的混沌流密码受参数变化影响的实验研究
www.ilib.cn
3.
The Theoretical Design for a Class of New Chaotic Feedback Stream Ciphers
一类新型混沌反馈密码序列的理论设计
www.ilib.cn
4.
On Construction of Annihilators of Boolean Function and its Application in Stream Ciphers
布尔函数零化子的构造及其在流密码中的应用
service.ilib.cn
5.
Hyperchaotic Sequences Based Block Encryption Ciphers and Its Application
基于超混沌序列的分组密码算法及其应用
www.ilib.cn
6.
A Study of the Algebraic Attacks on Stream Ciphers
基于流密码代数攻击的研究
www.ilib.cn
7.
Analysis on randomness testing of three stream ciphers and their components
对三个流密码及其组件的随机性检测分析
www.ilib.cn
8.
Distributed Decryption of Word-Oriented Stream Ciphers
基于字的流密码的分布式解密
www.ilib.cn
9.
Research of chaos multi-table substitution ciphers
一种混沌多表代换密码的研究
www.ilib.cn
10.
Analysis and Design of Lissajous Chaotic Stream Ciphers
李沙育混沌流密码的分析与设计
www.ilib.cn
1.
Design of one Chaotic System and Method to Generate Chaotic Sequence Ciphers
一种混沌系统的设计及混沌序列码的生成方法
www.ilib.cn
2.
A Divide-and-Conquer Attack on Self-Synchronous Chaotic Ciphers
对自同步混沌密码的分割攻击方法
www.ilib.cn
3.
Security Evaluation for a Class of Block Ciphers Based on Chaotic Maps
一类基于混沌函数的分组密码的安全性评估
www.ilib.cn
4.
Summary of 29 recommended ciphers in Japanese electronic government
日本29种电子政府推荐密码概述
service.ilib.cn
5.
Design of Chaos Multi-table Substitution Ciphers
混沌多表代换密码的设计
ilib.cn
6.
Architecture of Block Ciphers Processor Based on Specific Instruction-Set Research
专用指令分组密码微处理器体系结构研究
www.ilib.cn
7.
The Stream Cipher of Symmetrical Ciphers
对称密码的流密码
www.ilib.cn
8.
Review of algebraic attacks on stream ciphers
流密码代数攻击的研究现状及其展望
www.ilib.cn
9.
The circuit designing based on the neural network combining stream ciphers
基于神经网络组合序列密码电路的设计
service.ilib.cn
10.
A Related-Key Attack on Chaotic Stream Ciphers
对混沌序列密码的相关密钥攻击
www.ilib.cn
1.
Realization and Design of Data Encryption for IC Card Based on Chaotic Stream Ciphers
基于混沌密码流的IC卡数据加密算法设计与实现
service.ilib.cn
2.
On the Security of Three Stream Ciphers
关于三个流密码的安全性
www.ilib.cn
3.
Analysis of Two Stream Ciphers Based on Chaos
对两个基于混沌的序列密码算法的分析
www.ilib.cn
4.
Deceptive analysis in attacking a kind of knapsack ciphers systems based on genetic algorithms
对一类背包密码体制攻击中的遗传算法欺骗性分析
service.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/19 11:42:59