• An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • A two-phase process using both symmetric and asymmetric algorithms.

    使用对称算法对称算法的两阶段过程

    youdao

  • Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.

    因为使用非对象加密技术,一端自己证书私有密钥,比起清单5对称加密技术示例,处理起来更为简单。

    youdao

  • The difference between symmetric and asymmetric encryption

    对称对称加密差异

    youdao

  • One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.

    对称密钥一个缺点加密消息对称密钥花费长的时间,而且加密时间直接与消息的长短成正比。

    youdao

  • BindingAssertionHandler, shown in Listing 5, is a common base for handling verification of all three types of binding assertions (transport, asymmetric, and symmetric).

    如清单5BindingAssertionHandler一个支持全部绑定断言(transportasymmetricsymmetric)通用类。

    youdao

  • This hash value is what's finally included in the actual signature, and generating the signature is the only step for which symmetric vs. asymmetric encryption is any different.

    hash最终包含实际签名中,生成签名是非对称与对称仅有的不同之处。

    youdao

  • The equations of motion and kinematic equations under various landing conditions, including symmetric impact and asymmetric impact are provided.

    对其初始条件对称着陆对称着陆情况动力学分析。

    youdao

  • Using the symmetric algorithms and the asymmetric algorithms together security performance of the application system is improved.

    对称密码算法对称密码算法共同使用,增强了应用系统安全性

    youdao

  • The transfer formula between asymmetric tolerance marking and symmetric tolerance marking is deduced by the mathematical method.

    利用数学方法推导对称公差标注对称公差标注转换公式

    youdao

  • The influences of symmetric, asymmetric and double mountains on the frontogenetical process of a cold front are studied by using a semigeostrophic model.

    本文利用地转模式研究了对称对称地形以及地形冷锋锋生过程影响

    youdao

  • Through the simulations of three phases under the conditions of PT symmetric and asymmetric, the effect of excitation characteristics of three phases' PT on ferroresonance is concluded.

    通过三相pt对称对称两种情况计算,得到互感器三相励磁特性铁磁谐振的影响

    youdao

  • Both symmetric and asymmetric SPIR synapses were observed in the marginal division.

    边缘区内可观察到对称对称两种突触

    youdao

  • Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.

    目前有几种加密技术对称密钥密码系统对称密钥密码系统。

    youdao

  • In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.

    换言之可以同时使用多个证书密码对称密钥以及对称密钥对单个对称密钥进行加密

    youdao

  • Four known damage patterns, including single, symmetric, asymmetric and multi-story damages, are simulated by removing corresponding braces.

    通过拆除斜撑模拟了损伤对称多损伤、非对称损伤以及多层损伤四种损伤模式

    youdao

  • The calculations covered symmetric and asymmetric, stable and unstable resonators.

    计算包括对称对称的、稳定与非稳定的。

    youdao

  • The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.

    现有两种主要的、相互竞争着的密码术,称作钥(即对称系统钥(即不对称)系统。

    youdao

  • This paper mainly introduces the basic dynamic models of evolutionary game theory: symmetric replicator dynamic model, asymmetric replicator dynamic model and some conclusions.

    介绍进化博弈理论基本动态模型对称博弈模仿者动态模型和非对称博弈模仿者动态模型及其相关结论

    youdao

  • This section describes how to generate and manage keys for both symmetric and asymmetric algorithms.

    描述如何对称算法对称算法生成管理密钥

    youdao

  • Comparison and analysis of the respective information both symmetric and asymmetric circumstances, whether the buyback contract makes supply chain coordination.

    分别比较分析两种信息对称和不对称情况下供应链回购契约是否使得供应链达到协调

    youdao

  • This paper is devoted to some typical asymmetric watermarks and some basic characteristics of asymmetric watermark and symmetric watermark.

    分析几种典型的对称数字水印算法,并且对称水印加密算法非对称水印加密算法特点进行比较分析。

    youdao

  • The stability of the, symmetric and asymmetric rotational discontinuities with electron sense of rotation is studied by means of a one dimensional hybrid particle simulation code.

    混合粒子编码研究了具有电子旋转方向对称对称旋转间断稳定性

    youdao

  • Difference exists between the maximum absorbency of the asymmetric dyes and the average of the maximum absorbency of the corresponding symmetric ones.

    其中合成对称染料最大吸收波长不是相应两个对称染料最大吸收波长的算数平均值,扩大了防光晕染料的选择范围。

    youdao

  • It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

    密码技术主要包括对称密码算法对称密码算法协议

    youdao

  • To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.

    与远端的沟通对称IV通常使用对称加密来加密对称金钥和IV。

    youdao

  • Explains how to do symmetric and asymmetric encryption.

    说明如何进行对称对称加密。

    youdao

  • Explains how to do symmetric and asymmetric decryption.

    说明如何进行对称对称解密。

    youdao

  • Using a developed modified influence function method, the cold rolling of thin strip in both symmetric and asymmetric cases were analysed with considering work roll edge contact.

    在考虑工作边部接触的前提下,采用自行开发改良影响函数对称对称冷轧过程进行了分析。

    youdao

  • Using a developed modified influence function method, the cold rolling of thin strip in both symmetric and asymmetric cases were analysed with considering work roll edge contact.

    在考虑工作边部接触的前提下,采用自行开发改良影响函数对称对称冷轧过程进行了分析。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定