• Ciphers are cryptographic algorithms that can reversibly transform data using a key.

    加密使用密钥数据进行可逆转换加密算法

    youdao

  • Determines the set of valid key sizes for the symmetric cryptographic algorithms.

    确定对称加密算法有效密钥大小设置

    youdao

  • All kinds of cryptographic algorithms used can insure security of these activities.

    使用各种各样加密算法,可以保证这些活动的安全性

    youdao

  • There are a variety of cryptographic algorithms to choose from when performing encryption.

    执行加密多种密码学算法可供选择。

    youdao

  • They will typically employ cryptographic algorithms such as RSA, SHA-1, AES, and Triple-DES.

    它们通常都会采用一些加密算法例如rsaSHA - 1AESTriple - DES

    youdao

  • The XML Encryption specification lists a number of required and optional cryptographic algorithms including

    XML加密规范列出许多必需可选密码术算法,包括

    youdao

  • It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

    密码技术主要包括对称密码算法对称密码算法协议

    youdao

  • The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.

    签发机构证书“签名”,通过一种密码算法产生的散列值。

    youdao

  • Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.

    黑客可以利用密码分析技术恶意实例资源破解密码算法

    youdao

  • Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.

    维护机密性完整性典型解决方案涉及使用现有安全协议加密算法。

    youdao

  • As compared with software implementation, hardware implementation of cryptographic algorithms has large advantage in terms of performance.

    软件实现方式相比密码算法硬件实现性能方面具有比较优势

    youdao

  • These rules specify the order in which messages are sent, the format of each message, and the way cryptographic algorithms are applied to network communications.

    这些规则指定消息发送顺序消息格式以及网络通信应用加密算法方式

    youdao

  • Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.

    不对称加密算法(称为公钥算法)要求每个实体都维护一对相关密钥公钥

    youdao

  • We contrast the result of Elliptic Curve Cryptographic Algorithms and the algorithm given in this paper, the latter is better in the effect and speed of encryption.

    同时椭圆曲线加密算法本文所采用的算法对加密效果进行了分析,发现本文所采用的算法保密效果和加密速度方面要优于椭圆曲线加密算法。

    youdao

  • This paper describes the design and implementation of the cryptographic API in Secure Multicast System and discusses the optimization of the cryptographic algorithms in implementation.

    文章描述了安全多播系统中的密码api设计实现讨论了密码算法实现中的优化问题

    youdao

  • The technical of cryptogram which refer to this paper is discussed firstly. And the emphases of this discussion are about the elliptic curve cryptographic algorithms and authentication.

    本文首先论文所涉及密码技术作了介绍重点讨论椭圆曲线加密算法几种常见的身份认证技术。

    youdao

  • In these public key cryptographic algorithms, the kernel operations are modular exponentiation of multi-precision integer and elliptic curve scalar multiplication, which both are computing intensive.

    这些公钥密码算法关键操作数模乘操作椭圆曲线标量乘法操作,属于计算密集型运算。

    youdao

  • Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.

    密钥—密钥一些密码数据通常使用特定加密算法用户密码中获得

    youdao

  • Both rely on authentication algorithms supplied by the Cryptographic API, which also included in the 2.6 kernel.

    它们都依赖于2.6内核包含CryptographicAPI提供认证算法

    youdao

  • Secure hash algorithms are important tools for cryptographic applications such as digital signatures.

    安全散列算法数字签名密码学应用中重要工具

    youdao

  • Polynomial modulo reduction algorithms are one of the fundamental issues of computer algebra, and widely used in coding algorithms and cryptographic system design.

    多项式归约算法计算机代数中的基本问题之一编码算法密码体制设计中有着广泛应用。

    youdao

  • The proposed algorithms are suitable for software implementations on gener - al-purpose microprocessors, and can be used in public key cryptographic applications such as RSA and ECC.

    本文算法主要适用软件实现rsaecc公钥体制实现中广泛的应用

    youdao

  • We cover algorithms, methods, and techniques in order to create state-of-art cryptographic embedded software and hardware using common platforms and technologies.

    我们涵盖了算法方法技术以便使用通用平台技术创建最先进加密嵌入式软件硬件

    youdao

  • Instances of this class are used to specify the cryptographic characteristics of the algorithms used when securing messages.

    此类实例用于指定保护消息使用算法加密特性

    youdao

  • This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.

    属性标识创建XML数字签名时涉及到的所有加密功能包括哈希算法公钥算法消息身份验证代码(MAC)填充。

    youdao

  • This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.

    属性标识创建XML数字签名时涉及到的所有加密功能包括哈希算法公钥算法消息身份验证代码(MAC)填充。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定