单词 | encryption algorithm |
释义 | 例句释义: 加密算法,加密演算法,加密模型,加密的程序 1. Specify encryption algorithm (-ea) This option allows you to choose a strong encryption algorithm to encrypt your new database. 指定加密算法(-ea)此选项允许您选择用于加密您新数据库的高度加密算法。 www.ianywhere.com 2. Try to use built-in primitives instead of building your own construction out of an encryption algorithm and a hash function. 尝试使用内置原语而不是抛开加密演算法和杂凑函数去建构自己的构造。 www-128.ibm.com 3. This thesis is to focus on research group of the key agreement protocol session keys, as well as the mainstream encryption algorithm, etc. 本论文的重点就是研究群组密钥协商协议中的会话密钥,以及主流的加密算法等。 zhidao.baidu.com 4. It is not the only option which to increase the key length of encryption algorithm in order to enhance security. 仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。 www.mr5i.com 5. If the encryption algorithm or minimum key length is not available on a given client, Outlook Web Access does not allow encryption. 如果在给定的客户端上加密算法或最小密钥长度不可用,OutlookWebAccess将不允许加密。 technet.microsoft.com 6. Specifies the encryption algorithm used to encrypt the message body of a private message. 指定用于对私有消息的消息体进行加密的加密算法。 msdn2.microsoft.com 7. Encapsulates the encryption algorithm used for XML encryption. 封装用于XML加密的加密算法。 msdn2.microsoft.com 8. You could also use a custom encryption algorithm to encrypt the username and the password at the client end using WMLScript. 您也可以用WMLScript来编写自定义的加密算法,以对客户端的用户名和密码进行加密。 www.ibm.com 9. If clear text is not secure enough for your application, add an encryption algorithm. 对您的应用程序来说,如果明文形式不够安全,请添加加密算法。 msdn2.microsoft.com 10. Brute force attack on the RC4 encryption algorithm is one of the research directions of cryptology. 暴力破解加密算法是密码学的研究方向之一。 goabroad.zhishi.sohu.com 1. Advanced EncryptionStandard(AES)encryption algorithm as a representative of cryptography today has very broad prospects for development. 高级加密标准AES作为当今密码学的代表之一,拥有非常广阔的发展前景。 www.zidir.com 2. Property contains the cipher strength of the encryption algorithm used on this connection. 属性包含该连接所使用的加密算法的密码长度。 msdn2.microsoft.com 3. Represents the base class from which all implementations of the Rijndael symmetric encryption algorithm must inherit. 表示Rijndael对称加密算法的所有实现必须从其继承的基类。 msdn2.microsoft.com 4. The system car also use encryption algorithm to encrypt password to guarantee the system security. 同时系统还利用加密算法对密码进行加密,从而进一步保证了系统的安全性。 51lunwen.net 5. A consistent recommendation is to never create your own or use a proprietary encryption algorithm. . . 从一致性角度来考虑,绝对不要创建自己或使用私有的加密算法…… www.infoq.com 6. With the traditional symmetric encryption algorithm, the algorithm uses elliptic curve cryptography which is difficult to be broken. 其次,本文提出基于椭圆曲线的同态加密算法,对传感器数据进行加密。 www.fabiao.net 7. The key is typically a random sequence of bits; its size categorizes the strength of the encryption algorithm. 密钥一般是0或1的一个随机序列;其大小区分了加密算法的能力。 www.ibm.com 8. This message is encrypted, but with a weak encryption algorithm. 这封信已加密,但使用的是弱加密算法。 translations.launchpad.net 9. What is the major difference between the authentication algorithm and encryption algorithm? 认证算法和加密算法之间的最大的区别是什么? hi.baidu.com 10. Textual representation of the encryption algorithm. 加密算法的文本表示法。 msdn2.microsoft.com 1. In chapter 7, it produces researches of encryption algorithm, secret-key's produce, and its use, management security. 第七章对加密算法和密钥,以及在一卡通系统的产生、使用与管理提出了安全性的研究。 www.fabiao.net 2. Encryption Expert uses a hybrid encryption algorithm for encrypting database backup images. EncryptionExpert对加密数据库备份映像使用混合的加密算法。 www.ibm.com 3. and decryption algorithm is the inverse transformation of encryption algorithm. 解密算法是加密算法的逆变换。 ip.com 4. introduced over the DES encryption algorithm process. 以上介绍了DES算法的加密过程。 jwc.sdjtzyxy.com 5. The combination of encryption algorithm and the key length governs the strength of the encryption type. 加密算法和密钥长度的组合决定加密类型的强度。 www.ibm.com 6. It is probably good practice to check on licensing issues before incorporating any encryption algorithm into your application. 可取的做法是,在将任何加密算法放入到应用程序中之前都检查许可问题。 www-128.ibm.com 7. Each INTEGER in the SEQUENCE specifies an encryption algorithm that the client supports. SEQUENCE中的每个INTEGER指定客户机支持的一种加密算法。 www.ibm.com 8. Property contains the encryption algorithm used by the connection. 属性包含连接使用的加密算法。 msdn2.microsoft.com 9. To encrypt and decrypt data, you must use a key with an encryption algorithm that performs a transformation on the data. 若要加密和解密数据,必须使用具有对数据执行转换的加密算法的密钥。。 msdn2.microsoft.com 10. encryption algorithm, additional password to the folder, the folder you more secure. 使用了高强度的加密算法,给文件夹加密码,让您的文件夹更安全。 www.showxiu.com 1. The SSL Server responds with the encryption algorithm and hash function to be used. SSL服务器用加密算法以及要使用的散列函数来表示响应。 www.ibm.com 2. Research on Secure Multicast Encryption Algorithm and Group Key Management Model. 开展组播算法与组播安全方面的研究。 www.scut.edu.cn 3. The task implement RSA public key encryption algorithm with Montgomery algorithm. 本课题将RSA公钥加密算法用蒙哥马利算法实现。 blog.sina.com.cn 4. In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider. 在这个演示中,我使用了SunJCE密码术供应商的TripleDES块加密算法。 www.ibm.com 5. His contributions to these fields include: The Cramer-Shoup system asymmetric encryption algorithm bears his name. 其主要贡献提出了以他名字命名的克拉美-舒普非对称加密算法系统。 www.icili.com 6. Encryption algorithm from a weak cryptography on the function f and r sub r th iteration key component. 加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。 www.pudn.com 7. To send a private message, the sending application must specify that encryption be used and, optionally, the encryption algorithm. 若要发送私有消息,发送应用程序必须指定使用加密,或指定加密算法(可选)。 technet.microsoft.com 8. This article discusses the encryption algorithm of PC hard disk serial number with software according to the RSA encryption algorithm. 本文讨论通过RSA加密算法,对PC机硬盘序列号信息进行软加密,实现软件的试用。 www.dictall.com 9. The security of two kinds of image encryption methods is analyzed, and an improved image encryption algorithm is proposed. 在对现有的两类图像加密方法安全性分析的基础上,提出了一种改进的图像加密方法。 www.ceps.com.tw 10. The data encryption algorithm based on chaos and its FPGA implement are mainly discussed in this dissertation. 本文主要论述了基于混沌的数据加密算法的设计及其FPGA实现过程。 www.fabiao.net 1. Provides a symmetric encryption algorithm to encrypt message text. 提供对称加密算法来加密消息文本。 msdn2.microsoft.com 2. The encryption algorithm is created specific to the particular use case based on a key fed into the algorithm. 加密算法是针对特定用例根据提供给算法的密钥创建的。 www.ibm.com 3. The new image encryption algorithm was proposed based on multiple Fresnel diffraction transforms and phase encryption masks. 基于多重菲涅耳衍射变换和相位密码板,设计了一种新的图像加密计算方法。 www.dictall.com 4. Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data. 选择在IPSec隧道中加密数据所用的加密算法和散列算法。 www.ibm.com 5. Class by using the specified subject identifier type, content information, and encryption algorithm. 构造函数通过使用指定的主题标识符类型、内容信息和加密算法来创建。 msdn2.microsoft.com 6. Specifies the name of the encryption algorithm that is used to hash password values. 指定用于对密码值进行哈希运算的加密算法的名称。 msdn2.microsoft.com 7. So this paper proposes a new mixed encryption algorithm (TRA) that can solve these problems and improve intensity of encryption. 文中提出一种新的复合加密算法TRA,在提高加密强度的前提下,解决以上问题。 www.ceps.com.tw 8. Netscape and this server cannot communicate securely Because they have no common encryption algorithm. Netscape和此服务器无法安全地进行通信,因为它们没有共同的加密算法。 dict.ebigear.com 9. In the third and forth chapter two key technique of smart card COS-encryption algorithm and communication protocol are narrated. 第三、第四章主要讲述了智能卡COS开发的两项关键技术——加密算法和通信协议; www.fabiao.net 10. This article discussed a new color image encryption algorithm. 讨论了一种新的彩色图像加密的算法。 www.joca.cn 1. Gets a value that identifies the bulk encryption algorithm used by this SslStream. 获取一个值,该值确定此SslStream使用的批量加密算法。 msdn2.microsoft.com 2. Proposes picture encryption algorithm based on the double unidimensional chaos system. 提出了一个基于双一维混沌系统的图像加密算法。 dictsearch.appspot.com 3. There is no default encryption algorithm. 没有默认的加密算法。 msdn2.microsoft.com 4. The message is encrypted by using a message encryption key with a symmetric encryption algorithm such as triple DES. 使用讯息加密金钥透过对称加密演算法(例如三重DES),将讯息加密。 msdn.microsoft.com 5. According to the principle of the chess game, a new encryption algorithm was developed. 根据象棋的博弈原理而整理出一个全新的信息加密算法。 www.joca.cn 6. Based on region shifting encoding and pixel mapping, the paper proposes image encryption algorithm. 提出基于随机区域移位和随机像素映射的图像加密算法。 www.ceps.com.tw 7. Block ciphers use the same encryption algorithm for each block. 块密码对每个块使用相同的加密算法。 msdn2.microsoft.com 8. The encryption algorithm used on the source file needs a bigger key buffer than the one used on the destination file. 源文件所使用的加密算法所使用的密钥缓冲区需要大于目标文件的密钥缓冲区。 www.fan6.net 9. The Encryption algorithm used on the source file needs a bigger key buffer than the one on the destination file. 用在此源文件上的加密算法需要比目标文件上更大的密钥缓冲区。 dict.ebigear.com 10. DES encryption source code, using 3DES encryption algorithm. DES加密源代码,用3DES加密算法。 www.joys99.com 1. Class by using the specified content information and encryption algorithm. 构造函数通过使用指定的内容信息和加密算法来创建。 msdn2.microsoft.com 2. In order to encrypt and decrypt, you need an encryption algorithm and a key. 为了进行加密和解密,您需要加密算法和密钥。 office.microsoft.com 3. A multiple random file encryption algorithm is presented based on the Logistic chaos method. 利用混沌影射的方法设计了一种多随机性的文件加密算法。 www.dictall.com 4. Public key encryption algorithm is the most widely used is RSA. RSA算法的C 实现。公钥加密算法中使用最广的是RSA。 ftp.hackchina.com 5. The encryption algorithm is architecture and language-independent. However, both the sender and the receiver must know the secret key. 加密算法独立于架构和语言,不过,发送者和接收者均必须知道秘密密匙。 www.ibm.com 6. Ask the vendor what encryption algorithm it is using. 请询问您的提供商它所使用的是哪种加密算法。 www.ibm.com 7. An Image Encryption Algorithm Based on Random Key and "Quasi-Standard Map" 一种基于随机密钥及“类标准映射”的图像加密算法 www.ilib.cn 8. Under the MSP430 Subroutine des encryption algorithm. 在msp430下的des加密算法子程序。 www.hxzi.com 9. For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible. 为了更多的利益,利用单向加密算法或散列,像MD514或Blowfish,15将使密码的解密成为不可能。 www.ibm.com 10. Encryption algorithm and its applications in military communication 一种加密算法及其在军事通信中的应用 www.ilib.cn 1. Research into a mixed encryption algorithm 一种混合数据加密方法探讨 www.ilib.cn 2. Encryption algorithm description, one of the following values 加密算法说明,可以是下列值之一 technet.microsoft.com 3. Implementation of Biological Character Grouping Encryption Algorithm 生物特征分组加密算法的实现 www.ilib.cn 4. Implementation of Encryption Algorithm on Synchronous Data Triggered Architecture 密码算法在同步数据触发体系结构上的实现 www.ilib.cn 5. Adaptive and Integrative DCT Coefficients Disordering Encryption Algorithm 一种自适应综合DCT系数置乱加密算法 www.ilib.cn 6. Implementation of a Chaos Encryption Algorithm 一种混沌加密算法的实现 www.ilib.cn 7. A New Random Key Encryption Algorithm and a Compression Algorithm 一种随机公开密钥加密算法及一种压缩算法 www.ilib.cn 8. RSA-based random encryption algorithm and analysis of its dependability 基于RSA的随机加密算法与安全可靠度分析 service.ilib.cn 9. Cryptographic Analysis of a Group Key Management Scheme Based on a Public-key Encryption Algorithm 对一种基于公钥加密算法的组密钥管理方案的密码分析 www.ilib.cn 10. Study of stochastic junk code encryption algorithm 随机花指令加密算法研究 service.ilib.cn 1. Digital Image Encryption Algorithm Protect from Shear Transformation Attack 一种抗剪切变换攻击的数字图像加密算法 ilib.cn 2. The Probability Comparative about Security of Several Encryption Algorithm 几种加密算法安全性的概率分析 www.ilib.cn 3. Star of the encryption (pocket-sized version) the source code has contained the encryption algorithm under the VC realization 详细说明:加密之星(袖珍版)源代码包含了加密算法在VC下的实现 www.programsalon.com 4. Security technology research and application of mail encryption algorithm PGP 邮件加密软件PGP的安全技术研究与应用 ilib.cn 5. Research into applied software cipher encryption algorithm 应用软件密码加密算法研究讨 scholar.ilib.cn 6. The encryption algorithm used to secure data 用于保护数据的加密算法 www.ibm.com 7. Encryption algorithm, one of one of the following values 加密算法,可以是下列值之一 technet.microsoft.com 8. An Encryption Algorithm of Java Smart Card and Its Application Java智能卡的一种加密算法与实现 www.ilib.cn 9. Data Encryption Algorithm and The Generation and Operation of Great Primes 数据加密算法与大素数的生成及运算 service.ilib.cn 10. AES Encryption Algorithm's Application in No Stop Electronic Toll Collection System AES加密算法在不停车收费系统中的应用 service.ilib.cn 1. An Image Encryption Algorithm with Parameters Controlled by External Keys 外部密钥控制系统参数的图像加密算法 service.ilib.cn 2. The encryption key values for the specified encryption algorithm are stored in the 指定加密算法的加密密钥值存储在 msdn2.microsoft.com 3. and use a public key to encrypt symmetric key through non-symmetric encryption algorithm; 并使用一公用密钥通过非对称加密算法对对称密钥进行加密; ip.com 4. Design and Implement of a Data Encryption Algorithm Based on Chaotic Sequence 基于混沌序列的数据加密算法设计与实现 www.ilib.cn 5. The Design and Realization of One-dimensional Chaotic Map Encryption Algorithm 使用一维混沌表的加密算法的设计与实现 www.ilib.cn 6. Study on Multistage Chaotic Image Encryption Algorithm 一种多级混沌图像加密算法研究 www.ilib.cn 7. Improvement of Encryption Algorithm in Bluetooth 蓝牙系统加密算法的改善方案 www.ilib.cn 8. After the improvement encryption algorithm, hoped some people can use, good thing, 经过改进的加密算法,希望有人能用到,不错的东西 www.88pl.com 9. The encryption algorithm makes use of keys in one of two ways 加密算法通过以下两种方式之一使用密钥 www.ibm.com 10. Chaos-based Unattached Key DES Encryption Algorithm for Digital Image 基于混沌系统的独立密钥DES数字图像加密算法 www.ilib.cn 1. Chaos Based Encryption Algorithm for Compressed Video 基于混沌的视频流选择加密算法 ilib.cn 2. Research and Design of the QEA Encryption Algorithm QEA加密算法的研究与设计 www.ilib.cn 3. The Analysis and Improvement of DES Encryption Algorithm 安全加密算法DES的分析与改进 www.ilib.cn 4. The Application of Encryption Algorithm in the Fuze Setting System 一种加密算法在信息化弹药引信装定系统中的应用研究 www.ilib.cn 5. The application of AES encryption algorithm in WLAN security AES加密算法在无线网络安全中的应用 www.ilib.cn 6. Solution of Secure Information Encryption Based on Chaotic Mirror-Like Image Encryption Algorithm 混沌镜像算法在信息加密中的应用 www.ilib.cn 7. New Chaotic Encryption Algorithm and the Application 一种新的混沌加密算法及其应用 service.ilib.cn 8. The Realization of Image Randomly Encryption Algorithm Based on Logistic Chaotic Sequence and MATLAB 基于混沌的图像置乱加密算法及MATLAB的实现 www.ilib.cn 9. Analysis and Research of DES Encryption Algorithm DES加密算法的分析及其实现的改进 www.ilib.cn 10. Information Encryption Algorithm Based on Multiple Chaotic Mappings 基于多混沌映射的信息加密算法 www.ilib.cn 1. Image Encryption Algorithm Based on Transformation and Chaotic Sequences 基于混沌序列的频域图像加密技术研究 www.wanfangdata.com.cn 2. Practical Map Encryption Algorithm Based on Chaos System Under Network Circumstance 网络环境下地图的混沌加密实用算法 service.ilib.cn 3. Attack on a Distributed Encryption Algorithm Based on Discrete Logarithm 对基于离散对数的分布式加密算法的攻击 www.ilib.cn 4. Asynchronization Encryption Algorithm Based on Filter Banks 基于滤波带的非同步加密算法 www.ilib.cn 5. An improvement scheme for Liu's encryption algorithm 刘氏加密算法的一种改进方案 ilib.cn 6. An asymmetric encryption algorithm for images based on matrix transformation 一种基于矩阵变换的非对称图像加密算法 scholar.ilib.cn 7. Image Encryption Algorithm Based on Chaos System Two-dimensional Reversible Non-linear Maps 基于二维可逆非线性映射的图像加密算法 www.ilib.cn 8. An Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System 基于复合混沌的自适应图像加密算法 www.ilib.cn 9. Image encryption algorithm based on m-sequence integer modulation and image scrambling 基于m序列整数调制和置乱的图像加密算法 ilib.cn 10. An Image Scrambling and Encryption Algorithm Based on Affine Transformation 基于仿射变换的数字图像置乱加密算法 www.ilib.cn 1. A Novel Encryption Algorithm of Replace Key Matrix 一种全新的基于置换密钥矩阵加密算法 www.ilib.cn 2. Study on Composite Image Disorder Encryption Algorithm Based on Multi-Chaotic System 基于多混沌系统组合图像置乱加密算法研究 www.ilib.cn 3. Image encryption algorithm based on continuous chaotic system and Hash function 基于连续混沌系统和Hash函数的图像加密算法 www.ilib.cn 4. VAn image encryption algorithm based on chaotic mapping and vector quantization 基于混沌映射及矢量量化的图像加密算法 www.ilib.cn 5. Chaos System of Application in RSA Encryption Algorithm 混沌系统在RSA加密算法中的应用 ilib.cn 6. Image Scrambling Encryption Algorithm Based on Limited Integer Field 基于有限整数域上的图像置乱加密算法 www.ilib.cn 7. A Public Key Encryption Algorithm on Braid Groups 辫子群上的公钥加密算法 www.ilib.cn 8. Name of the encryption algorithm 加密算法名称 www-128.ibm.com 9. Encryption Algorithm Based on Coupled Toggle Cellular Automata 耦合触发细胞自动机加密算法研究 www.ilib.cn 10. Symmetric Encryption Algorithm Based on Pairing Function 基于配对函数的对称加密算法 www.ilib.cn 1. MPEG Video Encryption Algorithm Based on Entropy Encoding and Encryption 基于熵编码加密的MPEG视频加密算法研究 www.ilib.cn 2. For information on choosing an encryption algorithm, see 有关选择加密算法的信息,请参阅 msdn2.microsoft.com 3. Solution to File Encryption Based on Multiple Mode Encryption Algorithm 一种基于多模式加密算法的文件保护方案 scholar.ilib.cn 4. Binary Image Encryption Algorithm Based on Chaotic Sequences 基于混沌序列的二值图像加密算法 ilib.cn 5. The Function Analyse for Image Encryption Algorithm Based on Chaotic System 基于混沌的图像加密算法性能分析 ilib.cn 6. Image encryption algorithm based on mixed chaotic dynamic systems 一种基于混合混沌动力系统的图像加密算法 eagents.cn 7. An Encryption Algorithm of Vector Map Data 矢量地图数据的加密算法 www.ilib.cn 8. Studies and Implements of Bluetooth Encryption Algorithm Based on DES 以DES为基础的蓝牙加密算法的研究与实现 www.ilib.cn 9. The study and improvement of the bluetooth encryption algorithm 蓝牙加密算法的研究与改进 service.ilib.cn 10. Image Encryption Algorithm Based on Chaotic Sequences 基于混沌序列的图像加密算法 ilib.cn 1. An Image Encryption Algorithm Based on Mixed Chaotic Dynamic Systems 一种新的基于复合混沌模型的图像加密算法 ilib.cn 2. Image encryption algorithm based on heat flow cryptosystem and chaos 一种结合混沌的热流密码图像加密算法 www.ilib.cn 3. A Digital Image Encryption Algorithm Based on Chaotic Sequences 一种基于混沌序列的数字图像加密算法 ilib.cn 4. Encryption Algorithm Based on Higher Degree Residues 基于高阶余数的加密算法 service.ilib.cn 5. A Network Security System Model Based on Mixed Encryption Algorithm 基于混合加密算法的网络安全体系构造 service.ilib.cn 6. Extended Image Encryption Algorithm Based on Chaos System 一种改进的基于混沌系统的数字图像加密算法 ilib.cn 7. A new encryption algorithm based on the fractional Fourier transform 一种基于分数傅立叶变换的图像加密技术 www.ilib.cn 8. Encryption Algorithm of Cubic B-spline Curve and Surface Based on Amalgamation-Coeffecient-Matrix 基于矩阵融合的三次B样条曲线曲面加密算法 www.ilib.cn 9. Design for an IC Based on RSA Encryption Algorithm 一种基于RSA算法的加密芯片设计 service.ilib.cn 10. Image Encryption Algorithm Based on Chaotic Mapping 基于混沌映射的图像加密算法及软件实现 service.ilib.cn 1. Image Encryption Algorithm Based on Improved Chaotic Cat Maps 一种基于改进的混沌猫映射的图像加密算法 www.ilib.cn 2. A New Encryption Algorithm for Digital Video Based on Pseudo-Random Sequence 基于伪随机序列的视频图像加密新算法 ilib.cn 3. An image encryption algorithm based on double scrambling 基于双置乱的图像加密算法 www.ilib.cn 4. An attack with known plaintexts to an encryption algorithm based on arithmetic coding 对基于算术编码的一个数据加密算法的已知明文攻击 service.ilib.cn 5. An encryption algorithm of Distributed System Based on Chaos 一种基于混沌理论的分布式系统的加密算法 www.ilib.cn 6. An Encryption Algorithm Based on Chaotic Sequences 一种基于混沌序列的加密算法 www.ilib.cn 7. A new image encryption algorithm based on two-dimensional chaotic maps 二维混沌映射图像加密安全性分析及改进算法 www.ilib.cn 8. VLSI implement of image encryption algorithm based on chaos 基于混沌的图像加密算法的硬件实现 www.ilib.cn 9. Research on Encryption Algorithm Based on Magic Square 基于魔方加密算法的研究 www.ilib.cn 10. An Image Encryption Algorithm Based on Four-value Chaotic Array 一种基于四值混沌阵列的数字图像加密算法 www.ilib.cn 1. A New Communication Encryption Algorithm Based on Chaos 基于混沌的一种通信加密新算法 www.ilib.cn 2. An Image Encryption Algorithm Based on Coupled Chaotic Map 一种基于共轭混沌映射的图像加密算法 www.ilib.cn 3. A Hash Encryption Algorithm Based on Manual Neural Network 基于人工神经网络的数据散列加密算法 www.ilib.cn 4. A New Chaotic Encryption Algorithm Based on Ergodicity 一种基于遍历性的混沌加密新算法 www.ilib.cn 5. A Fast Image Encryption Algorithm Based on Chaos System and Henon Map 一种基于混沌系统及Henon映射的快速图像加密算法 service.ilib.cn 6. New Image Encryption Algorithm Based on Chaos System 基于混沌系统的图像加密算法 ilib.cn 7. A Novel Image Encryption Algorithm Based on Chaotic Sort 一种基于混沌序列排序的图像加密新算法 www.ilib.cn 8. Image Encryption Algorithm Cryptanalysis Based on One-dimensional Discrete Chaotic Map 基于一维离散混沌映射的图像加密算法分析 www.ilib.cn 9. A New Image Encryption Algorithm Based on Chaotic Map 一种基于混沌映射的数字图像加密新算法 www.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。