But encryption algorithms require a key.
但是加密算法需要一个密钥。
Do not use your own encryption algorithms.
不要使用自己的加密算法。
Currently the following encryption algorithms are supported.
目前支持的加密算法有以下几种。
The supported encryption algorithms are DES, Triple-DES, and AES.
支持的加密算法是DES、Triple - des和aes。
The core problem of information security is encryption algorithms.
本文讨论了有关信息安全的核心问题即加密算法。
For symmetric encryption algorithms, you can use either AES128 or AES256.
对于对称加密算法,您可以使用AES128或AES256。
For asymmetric encryption algorithms, you can use RSA1024, RSA2048, or RSA4096.
对于非对称加密算法,您可以使用RSA1024、RSA2048或RSA4096。
Encryption algorithms in spatial domain and frequency domain are proposed.
设计了空间域和频率域加密算法。
A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.
一个加密库代码,有aes,BLUEFISH的很多种加密算法。
When set to YES, SSL channels are restricted to use only FIPS approved encryption algorithms.
当设置为YES时,将限制SSL通道仅使用FIPS批准的加密算法。
You need to create three keys (one for each of the main encryption algorithms: rsa1, rsa, and dsa).
您需要创建三个密钥(每个密钥对应于一个主要加密算法:rsa1、rsa和dsa)。
And we also tested performance of smartphone affecting by different kinds of encryption algorithms.
另外本文还测试了各种加密算法对手机性能的影响。
The research on the dog circuits and encryption algorithms is one of the main interests in this area.
研究各种加密狗内部的电路及加密算法、程序是软件加密的一个分支。
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.
密钥—密钥就一些密码数据,通常使用特定加密算法从用户的密码中获得。
The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.
性能测试的结果表明密码算法和单向散列算法在SDTA结构上获得了较好的性能。
Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.
RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可的数据加密规则,支持改善的安全性能。
As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.
众所周知,加密算法是鉴权认证和完整性控制的基础,因此我们还介绍了选用加密算法的原则。
Absrtact: DES (data encryption standard) is one of the most popular encryption algorithms and has been widely used in many fields since its appearance.
摘要:DES(数据加密标准)是最常用的加密算法之一,自诞生至今一直被广泛应用于各个行业领域。
The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.
SSL客户机开始对话并发送诸如ssl版本之类的信息,同时还发送加密算法以及它所支持的散列函数。
With more and more attention on security in video, people have proposed many video encryption algorithms and many of them have been put into application.
目前视频安全得到了人们的广泛关注,许多视频加密算法提出并得到了应用。
Encryption algorithms encrypt or decrypt messages by performing a sequence of mathematical operations on the message, transforming its appearance but not its content.
加密算法通过在消息上执行一连串的数学操作从而对消息进行加密或解密,转换的是消息的外观而非其内容。
All client communications are encrypted with strong encryption algorithms, through SSL on HTTP calls and through RC2 in the Lotus Sametime instant messaging protocol.
所有客户端的通讯都是用强加密算法进行加密,通过HTTP调用上的SSL和LotusSametime即时通讯协议的RC2。
Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.
现代加密算法必须更为复杂,因为密码文本常用户保护价值数十万或数百万美元计的信息。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES).
经广泛测试、并成为工业界标准的数据加密标准(DES)是远程访问认证产品中最强的加密算法之一。
To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.
为了使SSL会话中所使用的加密算法和散列函数的规范更容易,这些算法被分组到各个密码套件(CipherSuite)中。
The Lotus Mobile Connect clientless option, that is, Lotus Mobile Connect HTTP access services, USES the same strong authentication and encryption algorithms as the full VPN client.
LotusMobileConnectclientless选项,即Lotus Mobile ConnectHTTP访问服务,使用与纯vpn客户端同样强大的认证和加密算法。
The Lotus Mobile Connect clientless option, that is, Lotus Mobile Connect HTTP access services, USES the same strong authentication and encryption algorithms as the full VPN client.
LotusMobileConnectclientless选项,即Lotus Mobile ConnectHTTP访问服务,使用与纯vpn客户端同样强大的认证和加密算法。
应用推荐