• The ECC and classical public key cryptogram system are compared.

    比较ECC经典公钥密码体系间的优劣;

    youdao

  • Cryptographic algorithm and key are the very important part of cryptogram technology.

    密钥密码算法安全密码卡的核心和关键

    youdao

  • Strand space model is a new formal analysis tool to the analysis of cryptogram protocol.

    空间模型一种新兴密码协议形式化分析工具

    youdao

  • It is necessary to mix address code in transform process of input TOD as block cryptogram.

    地址码必须分组密码方法那样,混淆对TOD输入变换过程之中。

    youdao

  • Why wouldn't Saknussemm have hidden an incredible invention behind this confusing cryptogram?

    为什么萨克努姗不能把不可思议的发现隐藏在打乱的密码里呢?

    youdao

  • Cryptogram programming of confidential information is an effective tool for ensuring information security.

    机密信息密码保证信息安全一种有效手段

    youdao

  • Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function.

    加密基于计算机总线接口提供密码服务功能硬件模块

    youdao

  • Lastly, the mixed cryptogram arithmetic was implemented and applied into the application of email encryption.

    最后实现混合加密算法将其应用加密发送电子邮件中。

    youdao

  • In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced.

    本文介绍密码学基本概念包括数论基础知识运算的概念。

    youdao

  • Therefore, the key of the efficient executing elliptic curve cryptogram is the efficient computing of multiple point.

    因此运算快速计算椭圆曲线密码快速实现关键

    youdao

  • High performance cryptogram server provides a safe, highly effective platform of cryptogram programming of information.

    高性能密码服务器提供了一个安全高效信息密码化平台

    youdao

  • In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.

    根据加密密钥解密密钥在性质上差异可以密码体制分为对称密码和公钥密码两大类。

    youdao

  • Software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.

    软件数据保护措施加强密码校验权限控制图形技术数据加密技术。

    youdao

  • The information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.

    尽管安全技术涉及范围十分广泛密码技术各种安全技术核心

    youdao

  • Considering RSA is one of the most popular public key cryptogram algirithms, a new group signature scheme completely based on RSA is proposed.

    考虑到RSA应用广泛公钥密码体制之一,首次基于RSA设计出种群签名方案

    youdao

  • The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.

    数字签名不同于传统的手写签名方式,基于公钥密码体制,依据一定的密码算法构造而成的。

    youdao

  • RSA Public Cryptogram algorithm is based on Theorem of Euler, whose security depends on the difficulty about the factor decomposed of great number.

    RSA公钥密码算法基础欧拉定理它的安全性依赖于大素数因式分解困难性

    youdao

  • He regarded the universe as a cryptogram set by the almighty-just as he himself wrapt the discovery of the calculus in cryptogram when he communicated with Leibnitz.

    宇宙视为上帝密文书写文件——恰如他布尼兹通信,把自己关于微积分发现加密的方式书写一样。

    youdao

  • Later in the war, the curator of the cryptogam herboriam was drafted to Bletchley Park because somebody misread cryptogam – tiny, non-flowering plants – as cryptogram.

    战争后期,隐花类草本馆馆长调到了布莱奇利公园因为有些人把隐花植物误解为——小型无花植物

    youdao

  • Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.

    加密可以个人计算机系统网络安全设备提供密码服务实现数据的安全存储网络信息保密通信

    youdao

  • Secure Electronic Transaction protocol(SET) has guaranteed security problem in the electronic payment process through formulating standard and using cryptogram technology.

    安全电子交易协议SET通过制定标准采用各种密码技术手段,确保电子支付过程中的安全问题

    youdao

  • The technical of cryptogram which refer to this paper is discussed firstly. And the emphases of this discussion are about the elliptic curve cryptographic algorithms and authentication.

    本文首先论文所涉及密码技术作了介绍重点讨论椭圆曲线加密算法几种常见的身份认证技术。

    youdao

  • The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.

    传输方面,采用通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。

    youdao

  • Give me problems, give me work, give me the most abstruse cryptogram, or the most intricate analysis, and I am in my own proper atmosphere. I can dispense then with artificial stimulants.

    难题,给我工作,给我深奥密码,给复杂分析工作,这样我觉得最舒适,才不需要人为的刺激。

    youdao

  • Give me problems, give me work, give me the most abstruse cryptogram, or the most intricate analysis, and I am in my own proper atmosphere. I can dispense then with artificial stimulants.

    难题,给我工作,给我深奥密码,给复杂分析工作,这样我觉得最舒适,才不需要人为的刺激。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定