• 攻击同时利用正确错误的加密结果发现隐藏密码设备中的秘密信息(密钥)。

    The attacker exploits the correct and incorrect encryption results to disclose the secret information (key) hidden in the cryptographic device.

    youdao

  • 同时给出了信息隐藏游戏模型EP模型,在确定了失真度量攻击信道之后给出了各自的容量计算方法。

    Meanwhile the game model and EP model are investigated and how to compute the capacity of information hiding for each model is illustrated later.

    youdao

  • 同时给出了信息隐藏游戏模型EP模型,在确定了失真度量攻击信道之后给出了各自的容量计算方法。

    Meanwhile the game model and EP model are investigated and how to compute the capacity of information hiding for each model is illustrated later.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定