• 攻击这位受欢迎小说

    He wrote an article which sniped at the popular novel.

    youdao

  • 提出两个抗选择密攻击门限密码系统

    Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.

    youdao

  • 随机预言模型下,方案适应性选择攻击可证明安全的。

    In the random oracle model, the scheme is provably secure against adaptive chosen ciphertext attacks.

    youdao

  • 高密度随机背包困难性假设,可以证明方案在唯攻击安全的。

    Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.

    youdao

  • 此外,证明方案加密算法DDH假设适应性选择攻击安全的。

    The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.

    youdao

  • 方案认为适应性选择攻击实用方案之一缺乏严格安全性证明

    This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.

    youdao

  • 分析表明,该所设计的加密算法不但抵抗攻击而且有效地抵抗选择攻击

    The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.

    youdao

  • 选择攻击公钥密码体制安全性很高的密码体制,它是设计主动攻击协议非常有用的工具。

    The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary.

    youdao

  • RSA算法相似,其安全性基于大数因式分解难度,能够抵抗对于RSA的选择攻击,并且易于软件实现

    Its (security) is based on the intractability of the integer factorization problem as RSA, and it is able to resist the chosen-ciphertext attack against RSA and easy to be implemented.

    youdao

  • 盖恩斯命令过去,另一个角度攻击杰克

    Gaines orders Kevin to circle around and come at Jack from another angle.

    youdao

  • 可以看看更早篇博:《攻击推荐系统》,讨论了来自几个作者的一

    Please see also my earlier post, "Attacking recommender systems", that discusses another paper by some of the same authors.

    youdao

  • 攻击可以发现系统结构其内的任一件目录进行访问包括

    An attacker can discover the structure of the file system and access to any directory within it, including.

    youdao

  • 由于敏感数据加密,任何直接数据库进行分析攻击方式,都只能看到

    Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    youdao

  • 武器现在不再提供额外攻击强度。

    The Glyph of Windfury Weapon will not apply additional attack power.

    youdao

  • 撤退期间悲剧降临多登纳将军儿子弗拉德·多登纳超级星舰“执行者号”实施攻击疾飞时阵亡

    Tragedy struck General Dodonna during the Yavin evacuation, as his son Commander Vrad Dodonna was killed during an attack run on the Super Star Destroyer Executor.

    youdao

  • 爆炸:雕被破坏将会爆炸伤害基于剩余能。回合、或每次受到攻击都将会消耗层。

    Explosive Glyph: the Glyphs explode when destroyed, inflicting damage based on the charges left. Glyphs automatically lose a charge each turn and when they are attacked.

    youdao

  • 酋长球场缺乏攻击天才,他们沃尔科特暗杀罗西基,小威胁,法布,范佩西,大杀马克可供调遣。

    There is no shortage of attacking talent at the Emirates with Walcott, Arshavin, Rosicky, Wilshere, Fabregas, Van Persie, Bendtner and Chamakh at his disposal.

    youdao

  • 还有认为马拉克背叛了利用绝地攻击作为一个机会夺取师父失败控制权

    Still others believe Malak turned on Revan, using the Jedi's attack as an opportunity to wrest control from his former Master's failing grip.

    youdao

  • 监狱现在失去了阻止目标攻击的效果,目标只是不能移动。

    Rune Prison no longer prevents the target from attacking, and only immobilizes .

    youdao

  • 但是相比接受·布莱克维尔队伍攻击喝彩杰拉德渴望关注他的好友卡拉格的伟大时刻

    But rather than accept the plaudits for his role in the demolition of Kevin Blackwell's side, Gerrard is keen to focus on what was a momentous occasion for his good friend, Carra.

    youdao

  • 河南大学高友朋(音译)教授光明日报发表的“保护春节声明,春节西方攻击

    "It is being attacked by Western culture," Henan University Professor Gao Youpeng wrote this week in the official Guangming Daily, issuing what he called a "declaration to protect Spring Festival".

    youdao

  • 莫吉攻击蒙特泽·莫罗,称没有好好的保护

    Moggi attacked Luca Montezemolo for not defending the Bianconeri enough.

    youdao

  • 盔甲将种在战斗干扰敌人利器,也可以呼唤自然力量予以攻击

    Additionally, armor is the ideal tool to throw at foes in order to interrupt them in combat, and the Glyphs call upon natural forces to harm the opponent.

    youdao

  • 同时传统加密技术所得到的容易攻击发现,影响信息安全性

    Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.

    youdao

  • 进入雅星系,多登纳谋划了义军战役至关重要攻击疾飞策略后勤保障义军飞行员做了简短报告。

    When the Death Star arrived in the Yavin system, Dodonna formulated the Rebels' crucial attack run strategy of the Battle of Yavin, and briefed the Rebel pilots as to its logistics.

    youdao

  • 传统线性移位寄存器序列具有推性,导致攻击能力不强。

    A traditional linear feedback successive-displacement register (LFSR) random sequence has recurrence character generally, so it makes the ability of anti-attacking of encrypted files poor.

    youdao

  • 传统线性移位寄存器序列具有推性,导致攻击能力不强。

    A traditional linear feedback successive-displacement register (LFSR) random sequence has recurrence character generally, so it makes the ability of anti-attacking of encrypted files poor.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定