Encryptor is the main object in the encryption process.
Encryptor是加密过程中的主要对象。
So far we have discussed the basic S/MIME encryption process.
到目前为止,我们讨论了基本的 S/MIME 加密过程。
Each step in the encryption process is explained after the listing.
在这个清单之后,我解释了加密过程中的每一个步骤。
The encryption process is: random generate number RN by random number generator RNG;
加密过程为:由随机数发 生器RNG产生随机数RN;
Code sections in Listing 5 demonstrated writing the text event to a file and running the encryption process.
清单5的代码表示将文本事件写到一个文件中并运行加密程序。
Simple C program to achieve RSA encryption process, the program is simple to understand for reference purposes only!
简单的C程序实现RSA加密过程,程序简单易懂,仅供参考!
LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.
LMHash容易被此类攻击攻破,是因为它没有使用现今常用的给加密过程引入“salt”的方式。
Although the actual encryption process is complex, the preceding example illustrates the concept and provides a high-level explanation of the process.
虽然真正的加密过程非常复杂,前面的示例说明了这个概念,并大体上说明了操作的过程。
All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?
所有RIM公司的说法都是建立在加密的信息是没有密钥来破解的基础上,那如果是在任意一个加密过程结束前?
Because this behavior can be used to crack a cipher, cipher modes are introduced that modify the encryption process based on feedback from earlier block encryptions.
因为这种行为可以用来破解密码,因此采用了密码模式,它会依据先前区块加密回馈来修改加密程序。
The general design rules of block cipher is discussed by analyzing the encryption process, key generating, encryption function and decryption process of des algorithm.
文中以DES加密算法为例,在分析DES加密过程、密钥计算、加密函数和解密过程的基础上,探讨分组密码的设计原则。
This protocol allowed each recipient using the same public key during the encryption process and the sender using a random number to enlarge the public key following the number of recipients.
该方案允许每个用户都采用相同的小公钥,发送者可根据要发送的用户数通过引入随机数r对加密密钥进行放大,每个接收者用两个小密钥对密文进行解密。
Payload interception and encryption of this process is what this article USES to add encrypted events to your calendar.
本文通过负载截取和过程加密的方式向日程表添加加密事件。
This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.
这一部分介绍生成公钥-私钥对的过程,这是加密和数字签名的基础。
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
This reading from a file is similar to the process performed during the encryption step.
从文件读取文本类似于加密阶段中执行的过程。
When the loop exits, I simply return the encryption result of the last data block, which is the result of Step 9 of the secret key generation process.
循环退出时,我只是返回最后一个数据块的加密结果,这就是密钥生成过程第9步的结果。
In cloud computing, VMM allows users to monitor and thus manage aspects of the process such as data access, data storage, encryption, addressing, topology, and workload movement.
在云计算中,VMM允许监视用户,因此可以管理数据访问、数据存储、加密、寻址、拓扑和工作负载转移等方面。
Before I get started, let me first differentiate this process from one of the other processes used to alter data and keep it away from those not authorized to view it: encryption.
在开始之前,请允许我首先将它与另一种改变数据以防止未授权查看的方法区分一下,这种方法就是加密。
A mismatch in either the encryption key or key version number causes the decryption process to fail.
加密密匙或密匙版本号的不匹配会导致解密过程失败。
This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.
这种方式对于数据库自身来说也是透明的,数据库管理系统也感觉不到加密解密过程的存在。
Finally, the new controlling mechanism and working process of the new RFID system applied with chaotic encryption are proposed.
最后,提出了基于混沌加密技术的RFID系统的新的控制机制和工作流程。
"Encryption" is the process of scrambling data using a kind of code known only to the software doing the coding, so that anyone accessing the private data is unable to read it.
“加密”是采用加扰的数据类型的代码只知道该软件做编码,任何人访问私人数据是无法读取如此的过程。
The whole process of encryption or decryption is governed by two dynamical tables.
整个加密或解密过程由两个随时更新的动态表所引导。
The encryption network interface card in this paper has surmounted two above-mentioned problems. It simplifies the information process of handling and raises the performance of entire network.
本论文的加密网卡克服了上述两个问题,它简化了信息处理过程,提高了整个网络的性能,起到了端到端的数据通信的保护。
In order to advance the security of Aeronautical Communication System, a simple and effective identity verification scheme was proposed, and the encryption was introduced in logging-on process.
为了提高航空通信系统的安全性,论文提出了一个简洁有效的身份认证方案,并在注册过程中引入加密技术。
Proposes an encryption scheme based on ECC and AES, expatiates the process of design, including key agreement, generation of conversation key and choice of encrypt mode.
提出一种基于ECC和AES相结合的加密系统,具体阐述了该系统的设计过程,包括密钥协定、会话密钥的生成及加密模式的选择。
According to the complexity of key generation and management process, this paper presents an encryption algorithm based on fingerprint to enhance the security of the digital information.
根据密钥产生和管理过程的复杂性,为增强数字信息安全性,提出一种基于指纹的数字信息加密算法。
Considering the characteristics of EPON, we introduce a "churning" policy and modify the process of register and OAM frames, thus to achieve an efficient authentication and encryption scheme.
重点结合EPON系统自身的特点,通过对注册过程以及OAM帧的修改,结合“搅动”策略实现了一种有效的鉴权与加密方案。
By using J2ME platform, we choose RSA encryption and signature algorithm to simulate the purchase and affirmation process and test the basic secure attacks.
基于J2ME平台,选择rsa加密、签名算法分别模拟了移动彩票购买、交易确认的过程,并测试了系统对基本攻击的抵御能力。
应用推荐