Ciphers are cryptographic algorithms that can reversibly transform data using a key.
加密是使用密钥对数据进行可逆转换的加密算法。
Determines the set of valid key sizes for the symmetric cryptographic algorithms.
确定对称加密算法的有效密钥大小设置。
All kinds of cryptographic algorithms used can insure security of these activities.
使用各种各样的加密算法,可以保证这些活动的安全性。
There are a variety of cryptographic algorithms to choose from when performing encryption.
在执行加密时,有多种密码学算法可供选择。
They will typically employ cryptographic algorithms such as RSA, SHA-1, AES, and Triple-DES.
它们通常都会采用一些加密算法,例如rsa、SHA - 1、AES和Triple - DES。
The XML Encryption specification lists a number of required and optional cryptographic algorithms including
XML加密规范列出了许多必需的和可选的密码术算法,包括
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.
签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
As compared with software implementation, hardware implementation of cryptographic algorithms has large advantage in terms of performance.
与软件实现方式相比,密码算法的硬件实现在性能方面具有比较大的优势。
These rules specify the order in which messages are sent, the format of each message, and the way cryptographic algorithms are applied to network communications.
这些规则指定消息发送的顺序、每条消息的格式以及对网络通信应用加密算法的方式。
Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.
不对称加密算法(也称为公钥算法)要求每个实体都维护一对相关密钥:私钥和公钥。
We contrast the result of Elliptic Curve Cryptographic Algorithms and the algorithm given in this paper, the latter is better in the effect and speed of encryption.
同时对椭圆曲线加密算法和本文所采用的算法对加密效果进行了分析,发现本文所采用的算法在保密效果和加密速度方面要优于椭圆曲线加密算法。
This paper describes the design and implementation of the cryptographic API in Secure Multicast System and discusses the optimization of the cryptographic algorithms in implementation.
文章描述了安全多播系统中的密码api的设计与实现,并讨论了密码算法实现中的优化问题。
The technical of cryptogram which refer to this paper is discussed firstly. And the emphases of this discussion are about the elliptic curve cryptographic algorithms and authentication.
本文首先对论文中所涉及的密码技术作了介绍,重点讨论了椭圆曲线加密算法和几种常见的身份认证技术。
In these public key cryptographic algorithms, the kernel operations are modular exponentiation of multi-precision integer and elliptic curve scalar multiplication, which both are computing intensive.
这些公钥密码算法的关键操作为大整数模幂乘操作与椭圆曲线标量乘法操作,均属于计算密集型运算。
Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.
密钥—密钥就一些密码数据,通常使用特定加密算法从用户的密码中获得。
Both rely on authentication algorithms supplied by the Cryptographic API, which also included in the 2.6 kernel.
它们都依赖于2.6内核中包含的CryptographicAPI提供的认证算法。
Secure hash algorithms are important tools for cryptographic applications such as digital signatures.
安全散列算法是数字签名等密码学应用中重要的工具。
Polynomial modulo reduction algorithms are one of the fundamental issues of computer algebra, and widely used in coding algorithms and cryptographic system design.
多项式模归约算法是计算机代数中的基本问题之一,在编码算法和密码体制设计中有着广泛应用。
The proposed algorithms are suitable for software implementations on gener - al-purpose microprocessors, and can be used in public key cryptographic applications such as RSA and ECC.
本文算法主要适用于软件实现,在rsa和ecc等公钥体制实现中有广泛的应用。
We cover algorithms, methods, and techniques in order to create state-of-art cryptographic embedded software and hardware using common platforms and technologies.
我们涵盖了算法、方法和技术,以便使用通用平台和技术创建最先进的加密嵌入式软件和硬件。
Instances of this class are used to specify the cryptographic characteristics of the algorithms used when securing messages.
此类的实例用于指定在保护消息时所使用的算法的加密特性。
This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.
此属性标识创建XML数字签名时涉及到的所有加密功能,包括哈希算法、公钥算法、消息身份验证代码(MAC)和填充。
This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.
此属性标识创建XML数字签名时涉及到的所有加密功能,包括哈希算法、公钥算法、消息身份验证代码(MAC)和填充。
应用推荐