• 程序然后计算显示密文

    The program will then calculate and display the ciphertext.

    youdao

  • 这样明文变成形式数字密文

    This will clear the form of a string of figures ciphertext.

    youdao

  • 本文的目的寻求打破密文机制

    The objective of this article is to find a mechanism for breaking a cipher text.

    youdao

  • 随后需要类似功能密文地方

    Then followed the local governments who needed seals for similar function.

    youdao

  • 解密密文最大长度字节长度。

    When decrypting the maximum length of the cipher text is the length of the modulus in bytes.

    youdao

  • 提出两个抗选择密文攻击门限密码系统

    Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.

    youdao

  • 建立密文数据库实现数据安全有效方法

    An effective method to realize database security is to establish encrypted database.

    youdao

  • 下面有关明文密文密钥关系表示法

    The following is a notation for relating plaintext, ciphertext, and keys.

    youdao

  • 密文通过8替换模加运算得到的。

    The cipher blocks are obtained by 8 rounds of substitution and the Modulo-Plus function.

    youdao

  • 密文大小一个常量并且的大小无关

    The size of the ciphertext was a constant and independent of the size of the ring.

    youdao

  • 回想前面讨论中过,CBC要求密文块链接

    Recall from my earlier discussion that CBC asks for cipher-block chaining.

    youdao

  • 密钥:密钥种在明文密文之间相互转换方式。

    Key: Key is a means of converting a plain-text into cipher-text and vice versa.

    youdao

  • 这种方式继续接一生成个块密文形式

    You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.

    youdao

  • 最后所有密文得到全部文本数据密文形式

    At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data.

    youdao

  • 我们可以加密,我们需要知道密文所需缓冲区大小

    Before we can encrypt, we need to know the size of the buffer required for the cipher text.

    youdao

  • 接着,接收应用程序一接收到消息对其解密密文转换明文

    The receiving application then decrypts the message upon receipt, converting from ciphertext back to plain text.

    youdao

  • 只有国王特殊密文当时称为西”,代表最高权威

    Only the king's special seal was then called 'Xi', which represented the highest authority.

    youdao

  • 通过使用动态密码明文修补使其密文长度明文长度相等

    The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher.

    youdao

  • 根据加密数据库特点分析了建立密文索引需要考虑主要因素

    According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.

    youdao

  • 第9结果最后8字节加密结果(放弃所以以前密文)。

    The result of the encryption of the last 8-byte block (discarding all previous cipher blocks) is the outcome of Step 9.

    youdao

  • 如果相同加密两次使用相同密钥由此产生的密文相同的。

    If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.

    youdao

  • 如果完整的明文对应密文可是实现破译功能得出加密密钥

    If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.

    youdao

  • 方法中的推导规则既简单便捷同时具有分析签名分析密文能力。

    This approach provides a set of inference rules for reduction and analysis of signature and cryptograph.

    youdao

  • 高密度随机背包困难性假设,可以证明方案在唯密文攻击安全的。

    Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.

    youdao

  • 根据des算法密钥文本统一处理以生成个加密(密文)形式的纯文本数据。

    The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.

    youdao

  • 此外,证明方案加密算法DDH假设适应性选择密文攻击安全的。

    The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.

    youdao

  • 同时传统加密技术所得到的密文容易攻击者发现,影响信息安全性

    Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.

    youdao

  • 方案认为适应性选择密文攻击实用方案之一缺乏严格安全性证明

    This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.

    youdao

  • 方案认为适应性选择密文攻击实用方案之一缺乏严格安全性证明

    This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定