单词 | cryptography |
释义 |
例句释义: 密码学,密码术,加密,密码编码学 1. An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site. Java密码扩展系统的一个实现在Sun的网站中可以找到密码服务提供者的目录。 www-128.ibm.com 2. Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt. 因此,使用量子加密将选票信息从投票站送往计票中心,也有那么点形象工程的色彩。 www.ecocn.org 3. The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace. name属性可以是位于System.Security.Cryptography命名空间中的某个抽象类的名称。 msdn2.microsoft.com 4. Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption. 由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。 www.ibm.com 5. Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe. 量子密码被证明是绝对安全的,其核心技术是量子密钥分配(QKD)。 dictsearch.appspot.com 6. Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based. 这些技术并没有打破量子密码学的基础理论。 www.ecocn.org 7. The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography. 密钥对关系中的互补性本质使得通过公钥加密实现这种唯一标识成为可能。 technet.microsoft.com 8. The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world. 量子密码术的不可侵犯性,是建立在真实世界里不见得成立的一组假设上。 dictsearch.appspot.com 9. OpenSSL is the cryptography library used for SSL communications, and is required by mod_ssl to encrypt HTTP traffic for Apache. OpenSSL是用于SSL通信的密码方法库,并且被mod_ssl用来对Apache的HTTP通信进行加密。 www.ibm.com 10. BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography. BLS短签名是双线性密码学中应用最为广泛的密码元件之一。 dictsearch.appspot.com 1. In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack. 另外,量子保密可以新的方法保护信息,从而避免经典攻击下的信息窃取。 physics.zju.edu.cn 2. Students should be able to analyse and prove the information protection capacity of modern cryptography basically after this course. 通过本课程的学习,要求能够从本质上分析和证明现代密码的信息防护能力。 www.gs.sjtu.edu.cn 3. The record-breaking MapReduce approach, he said, is useful in physics, cryptography and data mining. 他还介绍说,破记录的MapReduce方法在物理学,密码学和数据挖掘领域也是很有用的。 www.bing.com 4. One of the main applications of single-photon sources is the quantum cryptography, or exactly, the quantum key distribution (QKD). 单光子源最重要的应用之一是量子密码术,确切的说,量子密钥分配(QKD)。 www.fabiao.net 5. As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered. 伴随着技术的进步,特别是先进的互联网和密码学技术,使得传递重要信息的风险降低了。 www.bing.com 6. The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography. 加密与解密数据的密钥的安全传输是现代密码学最棘手的问题之一。 www.bing.com 7. Due to the various applications of the bilinear pairings in cryptography, there have been many pairing-based signature schemes. 由于双线性配对函数表现出的良好密码学特性,目前已经引起了众多关注。 www.dictall.com 8. Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology . 整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。 dict.veduchina.com 9. The strategy included a recommended set of advanced cryptography algorithms known as "Suite B" . 该政策包括一套推荐的高级加密算法,称为“SuiteB”。 www.certicom.com 10. The security of public-key cryptography depends on factorization or other difficult mathematical problems. 这种技术之所以安全,是因为应用了因数分解或其他困难的数学问题。 edba.ncl.edu.tw 1. Since the one-time pad is theoretically proven to be undecipherable , quantum cryptography is the key to perfect secrecy. 因为一次插入被理论上证明是不被破译的,量密码术是完全保密的答案。 dictsearch.appspot.com 2. Quantum cryptography ensures complete privacy because any attempt to observe the transmission will change the message. 由于任何企图监测传输过程的举动都会造成所传输信息的改变,量子密码术确保了传输的完全保密。 www.elanso.com 3. With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values. 使用了公开密匙加密后,希望接收已加密消息的一方将创建一对密匙值。 www.ibm.com 4. For more precise control, you can use the System. Security. Cryptography classes as well. 要进行更精确的控制,也可以使用System.Security.Cryptography类。 msdn2.microsoft.com 5. A digital certificate is more than just a cryptography key; it is an online credential. 数字证书不仅仅是一个加密密钥,它还是一个在线凭证。 www-128.ibm.com 6. Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically. 非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。 technet.microsoft.com 7. This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature. 使用该类可方便地在VB应用程序中实现对称密钥、公开密钥和数字签名算法,并且不受中英文编码方式的限制。 www.dictall.com 8. Be signed with a strong name using standard public key cryptography. 使用标准公钥密码系统用强名称签名。 msdn2.microsoft.com 9. The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP). Windows密码API(cryptoAPI)密码服务提供程序(CSP)的名称。 msdn2.microsoft.com 10. Cryptography is the art of "secret writing, " as the word's Greek roots attest. 作为希腊的词根资产,加密技术是一种“神秘编写”艺术。 www.ibm.com 1. The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones. 公共密钥密码系统中的保密的密钥,用于对到来的消息解密和对外出的消息签名。 kajaa.bbs.us 2. Among the mass information security technology, cryptography does undoubtedly play an important role. 在保障信息安全的众多技术中,密码技术无疑扮演着举足轻重的角色。 www.fabiao.net 3. The implementation speed of Elliptic Curve Cryptography (ECC) depends on the implementation speed of elliptic curve point multiplication. 椭圆曲线点乘的实现速度决定了椭圆曲线密码算法(ECC)的实现速度。 www.joca.cn 4. The security of the Elliptic Curve Cryptography (ECC) is built upon the difficulty of solving the elliptic curve discrete logarithm problem. 椭圆曲线密码体制的安全性建立在椭圆曲线离散对数问题的难解性上。 www.fabiao.net 5. In its simplest form, a digital certificate is an asymmetric cryptography key. 数字证书的最简单形式就是不对称加密密钥(asymmetriccryptographykey)。 www.ibm.com 6. You do not need to be an expert in cryptography to use these classes. 要使用这些类,您不必成为加密方面的专家。 msdn2.microsoft.com 7. The threshold cryptography is one of the most efficient and potential techniques. 门限密码体制是解决这类问题的一种最有效和最具潜力的技术。 www.lw23.com 8. Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link. 计算:量子密码理论上是无法破解的。但和任何安全系统一样,在实践中其安全度取决于系统里最薄弱的一环。 bbs.ecocn.org 9. Identity-based cryptography is a rapidly emerging approach to public-key cryptography that public keys can be arbitrary identifiers. 基于身份加密是一种以用户的身份标识符作为公钥的加密体制。 www.ceaj.org 10. Question: I'm using an X. 509 certificate with my service and I get a System. Security. Cryptography. CryptographicException. 问:我对我的服务使用的是X.509证书,并且获得一个System. msdn2.microsoft.com 1. Cryptography is one of important tools to guarantee information security. 密码学是保证信息安全的重要工具之一。 degree.fzu.edu.cn 2. The articles on cryptography do contain a great deal of mathematical depth. 关于加密算法的文章确实包含了很多高深数学逻辑。 www.infoq.com 3. The principles of cryptography are today applied to the encryption of fax, television, and computer network communications. 密码法的原则现今应用于传真、电视与计算机网络通讯的加密。 chinafanyi.com 4. Quantum cryptography is considered as a promising solution towards absolute security in communication systems. 量子密码学是实现通信系统绝对安全的有效解决方案。 www.fabiao.net 5. Instead of rolling your own, and introduced the risks commonly encountered when implementing cryptography in an application. 而不推荐使用您自己的演算法,并介绍了在应用程式中实作密码学时经常遇到的风险。 www-128.ibm.com 6. Elliptic curve cryptography and bilinear pairing is employed in the agreement, the dishonest node can be detected and identified. 协商过程采用椭圆曲线密码体制和双线性对来实施,能够对不诚实节点进行检测和鉴别。 www.joca.cn 7. The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms. 加密过程或解密过程一般被称作密码术,且依赖于数学算法。 www.ibm.com 8. Unlike cryptography , which allows data to be encrypted and then decrypted , hashing data is a one- way process . 与加密不同,加密允许数据加密后再解密,而哈希数据只允许单向进行。 www.bing.com 9. It is beyond the scope of this topic to provide a detailed explanation of cryptography and certificate technologies and concepts. 本主题不提供关于加密和证书技术及概念的详细说明。 technet.microsoft.com 10. The grouping cryptography is widely used in database encryption which now leads to great difficulty in substring query . 数据库加密通常采用分组加密算法,这给子串查询带来了很大的困难。 dictsearch.appspot.com 1. Key management subsystem supports the symmetric cryptography and asymmetric cryptography and abstract cryptography. 支持个人化过程中要求的对称算法、摘要算法和非对称算法等。 www.fabiao.net 2. In cryptography, the result of securing a block of data by applying a cryptographic function. 利用加密函数对数据块加密的结果。 www.hotdic.com 3. These properties can be used to quantum communication and quantum cryptography. 这些性质可以被用于量子通讯和量子密码术。 www.dictall.com 4. This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography. 此安全策略使用非对称加密执行数字签名与验证、加密和解密。 www.ibm.com 5. Advanced EncryptionStandard(AES)encryption algorithm as a representative of cryptography today has very broad prospects for development. 高级加密标准AES作为当今密码学的代表之一,拥有非常广阔的发展前景。 www.zidir.com 6. Primary interop assemblies must be signed with strong names using standard public key cryptography. 必须使用标准公钥密码系统用强名称为主Interop程序集进行签名。 msdn2.microsoft.com 7. Modern cryptography uses mathematically sophisticated algorithms implemented in hardware or software to encrypt and decrypt data . 现代密码术则使用以硬件或软件实现的数学上的高级算法来加密和解密数据。 www.bing.com 8. Unlike public-key cryptography, quantum cryptography should remain secure when quantum computers arrive on the scene. 量子密码术和公开金钥加密法的差别在于,前者在量子电脑出现后仍然牢不可破。 edba.ncl.edu.tw 9. This paper introduces the basic content of network communications. It also discusses cryptography , user authentication, firewall etc. 介绍了网络安全的基本内容,简述了加密技术、份认证技术、火墙技术等基本的信息安全技术。 dictsearch.appspot.com 10. Design and cryptanalysis on group (blind) signature is always the hotspot in the field of cryptography. 对群(盲)签名的设计与分析始终是密码学领域的一大热点。 www.fabiao.net 1. Tackling this hoary puzzle requires expertise in several fields, including cryptography, linguistics and medieval history. 要解决这个古老谜团,必须旁及好几个领域的专门知识,包括密码学、语言学和中世纪历史等。 dictsearch.appspot.com 2. The transport- layer security standard overcomes the inefficiencies associated with public- key cryptography . 传输层安全性标准解决了与公共密钥加密技术关联的效率低下问题。 www.bing.com 3. Finite Field, Theory of Finite Groups, Chaos Theory, Coding, Digital Watermarking, Cryptography. 有限域,有限群论,混沌理论,编码,数字水印,密码学。 www.bing.com 4. As an important branch of Cryptography, Hash function is a one-way function and a kind of encryption map. 散列函数是密码学中一个重要的分支,它是一种单向函数,是一类加密映射,可以利用它来保护信息。 www.fabiao.net 5. Bouncy Castle is an open source, lightweight cryptography package for the Java platform. BouncyCastle是一种用于Java平台的开放源码的轻量级密码术包。 www-128.ibm.com 6. Then the analysis of direct-embedding methods, indirect-embedding methods and halftone visual cryptography methods is conducted. 然后重点分析了直接嵌入法、间接嵌入法和半色调可视加密方法,并比较了它们的优缺点; cjig.cn 7. Kerberos authenticates the identity and encrypts their communications through secret-key cryptography. KERBEROS协议认证试图等录上网用户的身份,并通过使用密匙密码为用户间的通信加密。 www.24en.com 8. In cryptography circles, there is a saying: The security of an algorithm should not depend on its secrecy. 在密码界中,有一句谚语:算法的安全性不应该依赖于它的保密性。 www-128.ibm.com 9. Some applications try to combine public- and secret-key cryptography to achieve security and performance. 有些应用试图把明钥和秘钥密码术结合起来,以获得安全性和高性能。 dict.veduchina.com 10. In this paper, randomness evaluation of cryptography is studied and block cipher is selected as a research instance. 选择分组密码为实例,研究了对密码算法随机性的量化评估。 www.ceps.com.tw 1. Block cipher is an important branch of cryptography. Research on security of block cipher is an important direction. 分组密码是密码学的一个重要分支,分组密码的安全性研究成为一个重要的课题。 www.fabiao.net 2. As with other forms of cryptography , it is not distributed with the kernel by default due to export restrictions. 和其它的加密形式一样,由于出口的限制,默认情况下,是不和内核一同发布的。 dictsearch.appspot.com 3. This approach involving private and public key pairs is also known as public key cryptography. 这种涉及到私钥和公钥对的方式也被称作公钥密码术。 www.ibm.com 4. With the traditional symmetric encryption algorithm, the algorithm uses elliptic curve cryptography which is difficult to be broken. 其次,本文提出基于椭圆曲线的同态加密算法,对传感器数据进行加密。 www.fabiao.net 5. In the following example involving Alice and Bob, public key cryptography is easily used to verify identity. 在下列例子中包括甲和乙,公钥加密会轻松地校验身份。 www.winu.cn 6. The following figure shows the sequence of signing and encrypting with the addition of the supporting elements of public key cryptography. 下图显示在添加了公钥加密的支持元素的情况下进行签名和加密的顺序。 technet.microsoft.com 7. Secret key cryptography is one of the most important technologies in distributed systems security. 秘密密钥加密是分布式系统安全机制中一种最重要的技术。 www.ibm.com 8. He manages the Security and Cryptography Research group responsible for developing new security capabilities for Intel's products. 他目前管理着“安全以及加密技术研究部”,专门负责为英特尔的产品研发新的安全特性。 www.infoq.com 9. Since a pair of keys is involved, it is also called an asymmetric cryptography. 因为涉及到一对密钥,所以它也称为非对称加密。 www.ibm.com 10. A verifiable vector space secret sharing scheme is proposed, whose security relies on the security of Elliptic Curve Cryptography (ECC). 提出了一种可验证的矢量空间密钥共享方案,其安全性依赖于椭圆曲线密码的安全性。 xuebao.jlu.edu.cn 1. Describes elements that map friendly algorithm names to classes that implement cryptography algorithms . 描述将友好算法名映射到实现密码算法的类的元素。 www.bing.com 2. Provides links to security topics in the. NET Framework, including topics for code access security, role-based security, and cryptography. 提供指向.NETFramework中有关安全的主题的链接,包括关于代码访问安全、基于角色的安全以及加密的主题。 msdn2.microsoft.com 3. IPsec uses cryptography-based protection services, security protocols, and dynamic key management. IPsec使用基于加密的保护服务、安全协议和动态密钥管理。 technet.microsoft.com 4. The thesis focuses on the application of the modern cryptography in network digital film enlargement system. 本文主要对现代密码体制在网络数码扩印系统中的应用进行研究。 www.fabiao.net 5. This paper summarizes the conflicting facts between cryptography and virus prevention and related safety measures. 密码术和病毒预防间的关系一点也不简单。 www.dictall.com 6. Due to good cryptographic properties, orthomorphisms play an important role in cryptography for resisting cryptanalysis. 正形置换具有良好的密码学性质,可用于分组密码的设计以抵抗密码分析。 www.dictall.com 7. To use public-key cryptography to digitally sign a message, Alice first applies a hash algorithm to the message to create a message digest. 为了使用公钥加密对消息进行数字签名,小红首先将哈希算法应用于该消息以创建消息摘要。 msdn2.microsoft.com 8. Public-key Cryptosystems is one of the most important academic researches in the modern cryptography. 公钥密码算法是现代密码学中最重要的研究内容之一。 www.fabiao.net 9. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms. 大多数数位签章系统将公钥密码学和密码杂凑演算法结合使用。 www-128.ibm.com 10. This thesis mainly focuses on investigation on the quantum cryptography communication system and quantum logic gates. 论文对量子信息中的量子保密通信系统及量子逻辑门进行了研究。 www.fabiao.net 1. Specifies the friendly name of the algorithm that the cryptography class implements. 指定密码类实现的算法的友好名称。 msdn2.microsoft.com 2. The following figure shows the sequence of decrypting with the addition of the supporting elements of public key cryptography. 下图显示在添加了公钥加密的支持元素的情况下进行解密的顺序。 technet.microsoft.com 3. And the protection of property rights in the traditional cryptography, has its own deficiencies. 而传统的密码学在产权维护方面却有着自身的不足。 www.qk114.net 4. Cool ideas in Applied Cryptography Bruce Schneier discusses plenty of cool things you can do with cryptography. BruceSchneier讨论了许多您可以用密码学来做的很酷的事情。 www-128.ibm.com 5. Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest. 算法类型定义加加密算法是对称的、非对称的还是消息摘要。 www.ibm.com 6. Gets a value indicating whether a key container was randomly generated by a managed cryptography class. 获取一个值,该值指示某个密钥容器是否由托管加密类随机生成。 msdn2.microsoft.com 7. The improved system utilizes good properties of elliptic curve cryptography system and adopts zero knowledge proof. 改进的系统利用了椭圆曲线良好的密码特性,并采用零知识证明方法。 www.dictall.com 8. The protocol provides a model for importing the ideas of classical public key cryptography into the quantum world. 这个协议也为在量子世界中引入传统的公钥密码技术提供了一个模型。 www.lw23.com 9. Method or the name of an abstract cryptography class in the. 命名空间中的抽象加密类的名称。 msdn2.microsoft.com 10. Finally, we construct a secure and high efficiency multi-bank-cash system with conic curves cryptography and proxy signature. 最后,运用圆锥曲线密码学理论和代理签名技术,构建了一个安全高效的多银行电子现金系统。 www.13191.com 1. Describes how to map an algorithm name to a cryptography class and an object identifier to a cryptography algorithm. 描述如何将算法名称映射到加密类,以及如何将对象标识符映射到加密算法。 msdn.microsoft.com 2. The finite field arithmetic, elliptic curve cryptography (ECC) and the finite field multiplier are investigated in this thesis. 本论文研究的主要内容是有限域算术、椭圆曲线加密算法和有限域乘法器。 www.dictall.com 3. For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa. 例如,对核心层的加密技术的更改要求对加密控制进行更改,反之亦然。 www.ibm.com 4. It is the standard behind secure communication on the Internet, integrating data cryptography into the protocol. 它是支持在Internet上进行安全通信的标准,并且将数据密码术集成到了协议之中。 www.ibm.com 5. It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography. 它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。 www.ibm.com 6. The multi-scalar multiplication with two scalars is the most time consuming operations in elliptic curve cryptography(ECC). 在现代密码系统中使用椭圆曲线密码(ECC)最频繁的一种方法是多点乘算法。 www.dictall.com 7. The popular RSA cipher algorithm, widely deployed in public-key cryptography, relies on factorization. 目前在公开金钥加密法中,最常用到的RSA密码演算法,就是应用因数分解的原理。 edba.ncl.edu.tw 8. Digital signature is one of the most important primitives in public key cryptography. 数字签名在公钥密码学中有着非常重要的地位。 dictsearch.appspot.com 9. For more information on cryptographic configuration, see Configuring Cryptography Classes. 有关加密配置的更多信息,请参见配置加密类。 technet.microsoft.com 10. Cryptography is rapidly becoming a critical part of our daily lives . 密码术正在迅速成为我们日常生活中的一个重要部分。 www.bing.com 1. The two fundamental operations of cryptography are encryption and decryption. 加密的两个基本操作是加密和解密。 office.microsoft.com 2. He was also obsessed with lock-picking, and the schedule of railroad trains, and cryptography. 他对撬锁、火车时刻表以及密码学都情有独钟。 www.bing.com 3. In cryptography terms, this concept is similar to "one-time pads" , the most secure encryption method known. 按密码学术语来说,一次性序列与“一次一密”相似,这是已知最安全的加密方法。 www.ibm.com 4. "Applied algebra" introduce application of algebra in cryptography and coding theory. 应用代数主要内容是一些代数知识在密码学和编码学中的应用。 www.gs.sjtu.edu.cn 5. Secret information is retrieved according to the characteristic matrix and cryptography obtained by fingerprint matching. 解码时,根据指纹匹配后得到的特征矩阵和密文,对秘密信息进行恢复。 kns50.chkd.cnki.net 6. I used the pure Java implementation of Bouncy Castle Java cryptography package to handle digital signatures. 我使用了BouncyCastleJava密码术包的纯Java实现来处理数字签名。 www-128.ibm.com 7. The software architecture of the Cryptography Card is a layered structure, so the increment method is adopted during the development. 因为高速密码卡的软件系统是层次结构的,我们采用了渐进式的开发方法。 www.fabiao.net 8. You can map algorithms to object identifiers to extend the cryptography mechanism to use custom algorithms. 可以将算法映射到对象标识符,以扩展加密机制,以便使用自定义算法。 msdn2.microsoft.com 9. The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography. 而公钥密码算法正好可以解决这方面的问题,但在速度上远远不及对称密码算法。 www.boshuo.net 10. Public-key cryptography is an inherently different approach to security that doesn't require a shared secret. 公开密匙加密是一种与其他加密有着本质区别的安全方法,它不需要共享的秘密。 www.ibm.com 1. Hamming weight analysis of bits is used in several disciplines including information theory, coding theory, and cryptography. 汉明重量分析在包括信息论、编码理论、密码学等领域都有应用。 dearymz.blog.163.com 2. Shoup's main research interests and contributions are computer algorithms relating to number theory, algebra, and cryptography. 他的主要研究方向以及贡献是在与数论、代数学以及密码学有关的计算机算法上面。 www.icili.com 3. This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security. 这是一个高级示例,假定您熟悉加密、进程间通信和网络安全。 technet.microsoft.com 4. The two core elements of PKI comprise of public key cryptography and certification authority. 公匙基建的两个核心部分是公开密码匙密码技术及核证机关。 www.info.gov.hk 5. The phase-covariant quantum cloning has an important application in quantum cryptography. 相位协变量子克隆在量子密码术中有重要的应有。 www.opticsjournal.net 6. However, Public Key Cryptography takes things a step further and introduces the idea of signed public keys. 然而,公钥密码术更进一步,它引入了签名公钥的概念。 www-128.ibm.com 7. This paper presents a new fast scalar multiplication algorithm on elliptic curve cryptography. 基于椭圆曲线密码,提出了一种快速标量乘算法。 kns50.chkd.cnki.net 8. To set up your secure server, use public key cryptography to create a public and private key pair. 要设置您的安全服务器,使用公共钥创建一对公钥私钥对。 translations.launchpad.net 9. Instead many building blocks of cryptography rely on well-studied mathematics problems. 相反的,许多密码学的组成要素是建立在已被深入研究的数学问题之上。 edba.ncl.edu.tw 10. But considering the trend of cryptography in recent years, ECC and HCC will be the biggest winner in the cryptography field. 但是,从近几年密码学领域发展的情况来看,ECC和HCC必将是未来密码学领域应用的最佳选择。 epub.cnki.net 1. Key pair In asymmetric cryptography, the public and private keys together. 在非对称密码术中,公钥和私钥组合在一起成为密钥对。 www-128.ibm.com 2. Certificateless public key cryptography resolves the key escrow problem and public key authentication problem. 无证书公钥密码体制解决了密钥托管问题和公钥认证问题。 www.ceaj.org 3. Firstly in this thesis, we outline some basic theoretical foundations and the history about cryptography. 本文首先概要地介绍了密码学的一些基础知识和发展历程; www.fabiao.net 4. In cryptography , a product cipher developed by IBM that formed the basis of DES. It used 128-bit data blocks and a 128-bit key. 在密码学中,由IBM公司开发的一种乘积密码,后成为DES的基础,它使用128位数据块和一个128位的密钥。 dict.veduchina.com 5. It is a fundamental course in the subject of cryptography and information security. 它是计算机系密码学与信息安全方向的一门专业基础知识课程。 www.gs.sjtu.edu.cn 6. The following figure shows the sequence of encrypting with the supporting elements of public key cryptography. 下图显示在具有公钥加密的支持元素的情况下进行加密的顺序。 technet.microsoft.com 7. In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider. 在这个演示中,我使用了SunJCE密码术供应商的TripleDES块加密算法。 www.ibm.com 8. DNA cryptography is a new born cryptographic field emerged with the research of DNA computing. DNA密码是伴随着DNA计算的研究而出现的密码学新领域。 dictsearch.appspot.com 9. The following code example displays the cryptography settings for the specified stream. 下面的代码示例显示指定流的加密设置。 msdn2.microsoft.com 10. Element to contain a list of cryptography classes and mappings to friendly algorithm names. 元素来包含密码类和到友好算法名称的映射的列表。 msdn2.microsoft.com 1. Create an object that implements a particular cryptography algorithm by calling the. 方法,创建实现特定加密算法的对象。 msdn2.microsoft.com 2. The Set Registry tool allows you to change the registry settings for public key cryptography. 设置注册表工具使您得以更改公钥密码的注册表设置。 technet.microsoft.com 3. Encryption algorithm from a weak cryptography on the function f and r sub r th iteration key component. 加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。 www.pudn.com 4. The current uses for quantum cryptography are in networks of limited geographic reach. 现在的量子密码术仅限在地区性的网路上。 edba.ncl.edu.tw 5. Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease. 很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。 www.ibm.com 6. Many-to-one encryption and authentication scheme, which is a subclass of group cryptography, is discussed in this paper. 研究群组密码学中的一个子类:多对一加密认证方案。 www.dictall.com 7. Cryptography will be spread for the cipher text to achieve copyright protection. 密码技术将被保护对象加密为密文进行传播,实现版权保护; www.fabiao.net 8. Recent improvements and advancements in cryptography are ones of degree. 密码学最新的进步和提高是逐步产生的。 technet.microsoft.com 9. There are subtle issues of cryptography, replay attacks, and various other forms of attack that are easily overlooked. 加密、重播攻击和其中各种形式的攻击中有各种细微问题容易被忽视。 www.ibm.com 10. The thesis introduces the history, present situation and the prospect about the video compresses encode and the study of cryptography. 本文介绍了视频压缩编码和密码学的历史、现状和发展。 www.lw23.com 1. The cryptographic algorithm is public in modern cryptography. 现代密码体制中,加密算法是公开的。 kns50.chkd.cnki.net 2. Elliptic curve cryptography (ECC) is an important subject in the field of public key cryptography . 椭圆曲线密码体制是公钥密码学领域的一个重要课题。 dictsearch.appspot.com 3. The requirements we were working from didn't get into key strengths, cryptography mechanisms, and other low-level details. 来自于需求的工作不会涉及到密钥长度、加密机制和其他底层的细节。 www.ibm.com 4. The application of cryptography has infiltrated all the fields of social life, as in data encryption, web security, digital cash and so on. 密码学的应用已经渗透到了社会生活的各个领域,如数据加密、网络安全、电子现金等。 www.fabiao.net 5. This article summarizes the contents in the "Introduction to cryptography" series and includes a glossary of terms. 本文总结了“密码术简介”系列中的内容并包括术语词汇表。 www-128.ibm.com 6. Let us now learn about public key cryptography and how to use it to satisfy the needs of information security. 现在,让我们一起认识公开密码匙密码技术及如何利用它来满足资讯保安的需求。 www.info.gov.hk 7. Quantum cryptography protocols have the feature of unconditional security, which is ensured by attack-detection. 量子密码协议具有无条件安全特性,其安全性通过窃听检测来保证。 www.dictall.com 8. Hash functions are fundamental to modern cryptography. 哈希函数是现代密码系统的基础。 msdn2.microsoft.com 9. Analyze the differentiate about Secret and Public key cryptography in EB . 浅析私钥和公钥加密技术的区别。 www.bing.com 10. This topic is a high-level introduction to public key cryptography elements that specifically relate to message security. 本主题从较高的层次讲述了与邮件安全明确相关的公钥加密元素。 technet.microsoft.com 1. In a typical situation where cryptography is used , two parties ( Alice and Bob ) communicate over an insecure channel . 在一个使用加密的典型场合中,双方(小红和小明)在不安全的信道上通信。 www.bing.com 2. In the paper, based on the FPGA chip, the realization and optimized design of the elliptic curve cryptography are studied. 本文主要对基于FPGA芯片的椭圆曲线密码算法的实现及优化设计进行了研究。 www.dictall.com 3. Create a new Private Key and select the defaults for configuring Cryptography and your CA Name. 创建新的专用密钥,然后选择配置加密和您的CA名称的默认值。 technet.microsoft.com 4. Cryptography is a huge field, but only one facet of software security. 密码学是一个巨大的领域,但又只是软体安全性的一个方面。 www-128.ibm.com 5. Introduces key concepts in cryptography and describes how it is implemented in the. NET Framework. 介绍加密技术中的密钥概念,并说明如何在.NETFramework中实现加密。 msdn2.microsoft.com 6. PKCS is the Public Key Cryptography Standard - a series of standards created by RSA Labs. PKCS是公钥加密标准-由RSA实验室创建的一系列标准。 blog.sina.com.cn 7. Verifiable secret sharing is one of the most important tools in modern cryptography, and it is also one of basic tools in keeping secrets. 可验证秘密分享是现代密码学中最重要的工具之一,也是信息安全的基础和基本工具之一。 www.fabiao.net 8. of larger-number has universal application in cryptography, and it is the base operation in most public-key cryptography algorithms. 大数模幂在密码学领域有广泛的应用,它是公钥密码的基础。 dict.kekenet.com 9. Describes how cryptography is implemented in the base class library. 描述如何在基类库中实现加密。 msdn2.microsoft.com 10. Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently. 椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。 www.fabiao.net 1. Java offers complete support for cryptography. Java提供对密码术的完整支持。 www.ibm.com 2. Shiro's Cryptography support is meant to simplify your efforts to keep your data secure. Shiro的Cryptography支持就是为了减少你在确保数据安全上付出的努力。 www.infoq.com 3. Digital signatures rely on public key cryptography. 数字签名依赖于公共密钥加密学。 www-128.ibm.com 4. The primary disadvantage of public key cryptography is speed. 公共密钥加密的主要缺点是速度。 www-128.ibm.com 5. You don't want 80 percent of the Start menu startup time spent inside some cryptography function. 您不希望的开始菜单启动时间花费在加密函数中某些80%。 technet.microsoft.com 6. There are good on-line collection on computer security, privacy, cryptography policy, and free speech. 该中心有关乎计算机安全、隐私、密码系统政策和言论自由的在线汇集。 zhidao.baidu.com 7. RSA is a wide used public-key cryptography algorithm. RSA是一种被广为使用的公钥加密体制。 kns50.chkd.cnki.net 8. The dissertation research mainly block cryptography and its application, which is based on variable structure. 本文主要研究基于变结构的分组密码理论与技术及其应用。 www.fabiao.net 9. A new version of the operating system supports a new Cryptography Next Generation (CNG) key property that does not have a wrapper. 操作系统的新版本支持新的下一代加密技术(CNG)密钥属性,该属性没有包装。 technet.microsoft.com 10. Invests many of its resources in security and Java cryptography. 在安全性和Java加密技术上投入了大量资源。 www-128.ibm.com 1. Cryptography is the study of protecting information through the use of codes and ciphers. 密码学是一门研究如何通过使用代码和密码来保护信息的学科。 technet.microsoft.com 2. To request a certificate, you need to generate a keypair using cryptography software. 要请求证书,您需要使用加密软件生成一个密钥对。 www.ibm.com 3. And their fears are not groundless: More than 90% of proprietary cryptography has been broken. 他们的害怕并非没有根据:90%以上的专用密码术都已被攻破。 www.ibm.com 4. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition. 应用密码学:协议、算法和C源代码,第二版。 technet.microsoft.com 5. Kerberos was designed based on secret key cryptography and using trusted third party authentication. Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。 www.ibm.com 6. Since 1999, we have sponsored their annual Workshop on Elliptic Curve Cryptography. 自1999年起,我们每年都为其椭圆曲线加密技术研究工作室提供赞助。 www.certicom.com 7. With this course, the students will learn the mathematical background of cryptography. 通过本课程的学习,使学生掌握密码学的数学基础。 www.gs.sjtu.edu.cn 8. It does not require any understanding of cryptography concepts such as certificates or signatures. 不要求了解任何密码系统概念,如证书或签名。 technet.microsoft.com 9. In this case, there's an antidote: cryptography, the use of codes and ciphers to protect information. 在这种情况下,有一种解决办法:密码学,用密码保护信息。 www.wangxiao.cn 10. RSA public-key cryptography is based on this property of factorization. RSA公钥密码系统就是基于这种因数分解特性的。 www.ibm.com 1. Use public-key cryptography, which PHP supports. 请使用PHP支持的公钥加密技术。 www.ibm.com 2. Describes how to map an object identifier to a cryptography algorithm. 描述如何将对象标识符映射到加密算法。 technet.microsoft.com 3. An amazing discovery of modern cryptography is that virtually any task involving electronic communication can be carried out privately. 现代密码学有项令人惊喜的成就:任何与电子通讯有关的任务,几乎都能在不侵犯隐私的情况下完成。 edba.ncl.edu.tw 4. If you're familiar with data cryptography and SSL, you can skip this section. 如果您熟悉数据加密和SSL的知识,就可以跳过本节。 www.ibm.com 5. Cryptography is the process of hiding or obfuscating data so prying eyes can't understand it. 加密是隐藏或混淆数据以避免被偷窥的过程。 www.infoq.com 6. With his deep knowledge of both cryptography and classical antiquity, Ambrose is the governments best chance to uncover the cult. 随着他的加密和古代的深层知识,刘汉铨是政府最好的机会来揭露邪教。 zh.lyricgogo.altervista.org 7. All the clever cryptography means BitCoin dealings are difficult to trace. 所有聪明的密码学家都表示跟踪比特币交易很困难。 www.bing.com 8. Based on ID-based cryptography system, a new protocol for registration in Mobile IP based on random numbers is proposed. 在基于身份的密码系统的基础上,提出了一种新的应用于移动IP中的基于随机数的认证注册协议。 www.edu-hb.com 9. A knowledge of cryptography is a plus as well, but not required. 拥有密码学方面的知识固然好,但这并不是必需的。 www.ibm.com 10. In public-key cryptography, there is no need to exchange a common key. 在公钥加密中,无需交换公共密钥。 technet.microsoft.com 1. You can use Shiro's cryptography support anywhere, even if a Subject is not being used. 你可以在任何地方使用Shiro的加密支持,甚至在不使用Subject的情况下。 www.infoq.com 2. Key agreement is the basic element of cryptography, and it is also an important research content of information security. 密钥协商是密码学中的基本要素,也是信息安全领域的一个重要研究内容。 www.fabiao.net 3. Next time: In our next installment of this series of articles, we will discuss and implement the details of cryptography. 下一次:在这一系列文章的下一部分中,我们将讨论并实现密码术的细节。 www.ibm.com 4. This work will drive research in cryptography for many years to come. 该成果将会推动未来数年的密码学研究。 www.bing.com 5. first , let ' s get a few terms out of the way . in cryptography , a file of any type that isn ' t encrypted is called plaintext ; 首先,让我们解释几个术语上的拦路虎,在密码学中,没有加密的任何形式的文件都被叫做普通文本,而加密的数据则叫做密码文本。 www.ichacha.net 6. Public key cryptography represents a major innovation because it fundamentally alters the process of encryption and decryption. 公钥加密是重大的创新,因为它从根本上改变了加密和解密的过程。 technet.microsoft.com 7. FIPS 140-2 is required for sale of products implementing cryptography to the Federal Government. 销售给美国联邦政府的加密实施产品必须经过FIPS140-2验证。 www.certicom.com 8. And can we keep our privacy by using cryptography in solving them? 我们是否可以使用密码学来保护隐私? edba.ncl.edu.tw 9. Public key cryptography, on the other hand, uses a pair of keys: one for encryption and one for decryption. 公开密钥加密使用一对密钥:一个用于加密,一个用于解密。 www.ibm.com 10. There are also control challenges here, including those related to cryptography use. 这里还有一些控制上的问题,其中一些与应用加密有关。 www.infoq.com 1. In symmetric cryptography systems, a single key that is used for both encryption and decryption. 在对称密码术系统中同时用于加密和解密的单个密钥。 www-128.ibm.com 2. The most important supporting concept for message security is public key cryptography. 在邮件安全领域,最重要的支持性概念是公钥加密。 technet.microsoft.com 3. And others also publish useful articles on aspects of cryptography. 期刊和其它杂志也发布了关于密码术方面的有用文章。 www-128.ibm.com 4. While other courses, such as applied cryptography I got 10, although I only know the name LDAP, but never configured any security provider. 而其他的课程,像应用密码学我得了满分10分,尽管我只知道LDAP的名字,但从未设置任何安全供应商。 dictsearch.appspot.com 5. To offer a high efficiency digital signature based on elliptic curve cryptography. 为给出一种基于椭圆曲线密码的高效率的数字签名方案。 kns50.chkd.cnki.net 6. Because of the importance of key agreement, key agreement research became cryptography a research hotspot. 由于密钥协商的重要性,密钥协商的研究成为了密码学中一个研究的热点。 zhidao.baidu.com 7. To learn more about cryptography and SSL issues, browse the articles and tutorials listed in the Resources section later in this article. 要了解更多有关加密和SSL问题的信息,请参阅在本文后面参考资料中所列出的文章和教程。 www.ibm.com 8. It's amazing that we can say that quantum cryptography is already almost old hat. Lazaridis表示“我们很震惊地说量子密码学已经是我们过时的技术。” www.ecocn.org 9. For its application potential, its suggested to construct experimental system of quantum cryptography in China. 鉴于其应用前景,最后建议我国尽快开展量子密码的实验研究。 d.wanfangdata.com.cn 10. Hidden credential is based on ellipse curve cryptography and has a high secure level. 隐藏证书采用椭圆曲线加密的原理,具有极好的安全保密性与数据完整性。 www.dictall.com 1. The good news about cryptography is that we already have the algorithms and protocols we need to secure our systems. 密码学的一个好消息是我们已经有能够保证系统安全的的算法和协议。 dictsearch.appspot.com 2. Has information on the legal aspects of using cryptography in software. 可以提供关于在软件中使用加密的法律方面的信息。 www-128.ibm.com 3. Secure technologies such as cryptography will protect data access and use. 诸如密码系统这类的安全技术将保护数据的接入和使用。 www.uk.cn 4. Now it is time to create the cryptography devices. 现在开始建立一个加密的设备。 wiki.ubuntu.org.cn 5. The latest cryptography dictionary will be offered at first time. 第一时间提供最新的密码字典。 fool-club.com 6. Public key cryptography is computationally intensive because it is based on complex math. 由于公钥密码术基于复杂的数学理论,所以它是十分耗费计算机资源的。 www-128.ibm.com 7. For example, many popular press articles deal with cryptography: what it is, and where, when, and how to use it. 上。例如,许多流行的出版文章讨论密码学:它是什么,以及何处、何时及如何使用它。 www-128.ibm.com 8. convert communication; quantum cryptography; quantum communication; unconditional security; detectability; 隐蔽通信;量子密码;量子通信;无条件安全;可检测性; www.zidir.com 9. digital signature; quantum information; quantum cryptography; quantum signature; unconditional safe; 数字签名;量子信息;量子密码;量子信息签名;无条件安全; www.zidir.com 10. Electronic cash; Smart card; Elliptic curve cryptography; Multi- level proxy blind signature; Each node can be paid; Zero knowledge proof; 电子现金;智能卡;椭圆曲线密码体制;多级代理盲签名;节点均可支付;零知识证明; www.zidir.com 1. Characteristics, difference and attack ways of two conventional cryptography algorithms 两种传统加密算法的特性与机制差异及其破解方案 www.ilib.cn 2. Information security; Digital Rights Management; Attribute-Based Access Control; Identity-Based Cryptography System; 信息安全;数字版权管理;基于属性的访问制约;基于身份的密码体制; www.zidir.com 3. Public Key Cryptography for the Financial Services Industry: Extensions to Public Key Certificates and Certificate Revocation Lists 金融服务业用公开密钥加密:公开密钥证书和证书撤消列表的扩展 www.isres.com 4. Public Key Cryptography for the Financial Services: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography 金融业务的公开密钥加密:使用离散对数密码术的对称密码协议 www.isres.com 5. Cryptography Algorithm and its Application to Military Communication 密码算法及其在军事通信中的应用 www.ilib.cn 6. Research and Implementation of the Chaotic Stream Cipher-based Network Information Cryptography System 基于混沌序列密码的网络信息加密系统 www.ilib.cn 7. Design of single-photon detection system used in quantum cryptography communication 量子保密通信用单光子探测系统的设计初探 www.ilib.cn 8. Analysis and Study of Quantum Cryptography Communication System 量子保密通信系统的分析与研究 service.ilib.cn 9. Application of Irreducible Decomposition of Polynomials over Algebraic Extension Fields in Cryptography 代数扩张域上的多项式分解在密码学中的应用 service.ilib.cn 10. Hyperchaotic Systems with Coupled-feedback and Its Application to Cryptography Communications 耦合负反馈超混沌系统及在编码通信中的应用 service.ilib.cn 1. The Algorithm Implementation of Improving Efficiency of The Elliptic Curve Cryptography 椭圆曲线密码运算效率提高的算法实现 service.ilib.cn 2. Public Key Cryptography for the Financial Services Industry: Certificate Management 金融服务业用公开密钥加密:证书管理 www.mapeng.net 3. Technique of Digital Signature and Its Implementation in Java with Hybrid Cryptography 混合密钥的数字签名技术在Java中的实现 ilib.cn 4. Microsoft Enterprise Library Cryptography Application Block 加密应用程序块简介 www.ad0.cn 5. Then, cryptography used in encrypted database system is discussed; 然后阐述了密码学在密文数据库系统中的应用; www.fabiao.net 6. Elliptic Curve Cryptography and Its Application to Wireless Network 椭圆曲线密码及其在无线网络中的应用 www.ilib.cn 7. Realization of the Field-arithmetic Algorithms on Elliptic Curve Cryptography 一种椭圆曲线密码体制域算术操作的实现 www.ilib.cn 8. Implementation of elliptic curve cryptography accelerator 椭圆曲线密码加速器的设计实现 www.ilib.cn 9. Elliptic curve cryptography (ECC) has more attractive attributes when compared to RSA: short key length for same security level; 相对于RSA算法,椭圆曲线密码算法具有更高的单比特密钥安全性; www.fabiao.net 10. Visual cryptography is a visual secret sharing method which encodes a secret into several shares and decodes a secret with human eyes; 视觉密码是一种依靠人眼解密的一种秘密分享方法,在无法使用电脑解密的情况下,它是一个很好的解决方案。 dictsearch.appspot.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。