• 本文主要研究适用指纹细节点信息的指纹密钥算法

    The dissertation aims to study a fingerprint key algorithm suitable for fingerprint minutiae.

    youdao

  • 数据使用对称密钥算法进行加密,它使用一个密钥来实现对数据的加密解密

    The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.

    youdao

  • 因此指纹密钥算法成熟研究课题,还有很多问题有待解决。

    So far, the research on fingerprint key algorithm is still at its first stage.

    youdao

  • 由于方案避免使用公开密钥算法因而在保证支付公平性的基础上还兼顾了支付效率

    The analysis results show that the new solution can better meet the requirements of micro-payment for efficiency and fairness.

    youdao

  • 研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    youdao

  • 根据非线性动力学中的混沌理论设计混沌序列密码,利用序列密码RSA公开密钥算法构造新的混合密码体制。

    In this paper, a new chaos stream cipher was proposed based on the chaos theory of nonlinear dynamics. Combining this stream cipher with RSA algorithm, we construct a new hybrid cryptosystem.

    youdao

  • 除了加密内容以外,XML加密还允许上面讨论两个元素中指定用于加密算法或者加入用于加密的密钥

    In addition to the encrypted content, XML encryption allows you to specify the algorithm used for encryption or the encryption key used as part of the two elements discussed above.

    youdao

  • 一部分讨论不同类型密钥以及如何选择密钥算法

    This section describes different types of keys, and how to select an algorithm for your key.

    youdao

  • 使用强大的算法密钥所有数据都进行单向加密意味着的数据非常安全但是使用时很方便

    Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.

    youdao

  • 对称算法非常有效并且可以与用于加密解密计算单一密钥一起使用

    Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

    youdao

  • 加密算法密钥长度组合决定加密类型强度

    The combination of encryption algorithm and the key length governs the strength of the encryption type.

    youdao

  • 根据des算法密钥文本统一处理以生成个加密(密文)形式的纯文本数据。

    The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.

    youdao

  • 通过组合使用不同密钥长度散列算法IBMNAS提供1示的加密类型

    With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.

    youdao

  • 不同加密类型之间差异在于算法强度使用密钥长度

    The difference between the encryption types is the strength of algorithm and length of the key being used.

    youdao

  • 现在使用这个临时密钥des -cbc算法加密第3中得到附加后的字节数组

    I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.

    youdao

  • 规定RSA密钥交换认证算法使用,还规定了RC4_SHA_US密码规范。

    This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.

    youdao

  • 加密使用密钥数据进行可逆转换加密算法

    Ciphers are cryptographic algorithms that can reversibly transform data using a key.

    youdao

  • 算法密钥长度组合产生加密中等加密和加密。

    The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.

    youdao

  • 对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常公开的。

    An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    youdao

  • 非对称算法用于生成成对密钥

    Asymmetric algorithms are used to generate keys that exist in pairs.

    youdao

  • 对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    youdao

  • 密钥密钥一些密码数据通常使用特定加密算法用户密码中获得

    Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.

    youdao

  • 命令包括证书别名以及用于生成密钥算法规范密钥大小

    The command also includes an alias for the certificate, along with the specification of the algorithm and key size used to generate the key pair.

    youdao

  • 搜索密钥基本算法清单3

    The basic algorithm used to search for a key is shown in Listing 3.

    youdao

  • 加密算法通过以下两种方式之一使用密钥

    The encryption algorithm makes use of keys in one of two ways.

    youdao

  • 这个SunJCE提供程序适合生成非对称密钥因为没有包含rsa算法类型实现

    The SunJCE provider is not suitable for generating asymmetric keys, as it does not contain the RSA algorithm type implementation.

    youdao

  • WebSphereMQ许多不同加密类型,它们使用各种算法密钥长度

    There are many different types of encryption available in WebSphere MQ, using a variety of algorithms and key lengths.

    youdao

  • SSL握手过程中的密钥交换认证算法

    The key exchange and authentication algorithm used during the SSL handshake.

    youdao

  • Kerberos定义一种利用用户密码生成密钥算法

    Kerberos defines an algorithm to generate a secret key from the user's password.

    youdao

  • 接着抽取出的用Base 64编码密码解密密钥以及算法名称传递名为Decrypt方法(见密码术中的研究)。

    It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定