• But encryption algorithms require a key.

    但是加密算法需要一个密钥

    youdao

  • Do not use your own encryption algorithms.

    不要使用自己加密算法

    youdao

  • Currently the following encryption algorithms are supported.

    目前支持加密算法以下几种。

    youdao

  • The supported encryption algorithms are DES, Triple-DES, and AES.

    支持加密算法DESTriple - desaes

    youdao

  • The core problem of information security is encryption algorithms.

    本文讨论有关信息安全核心问题加密算法。

    youdao

  • For symmetric encryption algorithms, you can use either AES128 or AES256.

    对于对称加密算法可以使用AES128AES256

    youdao

  • For asymmetric encryption algorithms, you can use RSA1024, RSA2048, or RSA4096.

    对于非对称加密算法可以使用RSA1024、RSA2048RSA4096

    youdao

  • Encryption algorithms in spatial domain and frequency domain are proposed.

    设计了空间频率加密算法

    youdao

  • A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.

    一个加密代码有aes,BLUEFISH多种加密算法

    youdao

  • When set to YES, SSL channels are restricted to use only FIPS approved encryption algorithms.

    设置YES时,将限制SSL通道使用FIPS批准加密算法

    youdao

  • You need to create three keys (one for each of the main encryption algorithms: rsa1, rsa, and dsa).

    需要创建三个密钥(每个密钥对应于主要加密算法rsa1rsadsa)。

    youdao

  • And we also tested performance of smartphone affecting by different kinds of encryption algorithms.

    另外本文测试了各种加密算法手机性能影响

    youdao

  • The research on the dog circuits and encryption algorithms is one of the main interests in this area.

    研究各种加密内部电路加密算法、程序软件加密一个分支。

    youdao

  • It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

    密码技术主要包括对称密码算法对称密码算法协议

    youdao

  • The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

    加密算法安全性很大程度上取决于暴力破解的不可行性

    youdao

  • Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.

    密钥—密钥一些密码数据通常使用特定加密算法用户密码中获得

    youdao

  • The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.

    性能测试结果表明密码算法单向列算法SDTA结构上获得好的性能。

    youdao

  • Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.

    RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可数据加密规则,支持改善的安全性能。

    youdao

  • As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.

    众所周知加密算法认证完整性控制基础,因此我们还介绍选用加密算法原则

    youdao

  • Absrtact: DES (data encryption standard) is one of the most popular encryption algorithms and has been widely used in many fields since its appearance.

    摘要DES(数据加密标准)常用加密算法之一,自诞生至今一直广泛应用于各个行业领域。

    youdao

  • The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.

    SSL客户机开始对话发送诸如ssl版本之类信息同时还发送加密算法以及所支持散列函数

    youdao

  • With more and more attention on security in video, people have proposed many video encryption algorithms and many of them have been put into application.

    目前视频安全得到人们的广泛关注许多视频加密算法提出得到应用

    youdao

  • Encryption algorithms encrypt or decrypt messages by performing a sequence of mathematical operations on the message, transforming its appearance but not its content.

    加密算法通过消息执行一连串数学操作从而对消息进行加密解密转换的是消息外观内容

    youdao

  • All client communications are encrypted with strong encryption algorithms, through SSL on HTTP calls and through RC2 in the Lotus Sametime instant messaging protocol.

    所有客户端的通讯都是加密算法进行加密通过HTTP调用SSLLotusSametime即时通讯协议的RC2

    youdao

  • Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.

    现代加密算法必须更为复杂因为密码文本常用户保护价值数十万数百万美元计的信息

    youdao

  • It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.

    研究功耗分析如何破解密码算法中的密钥的关键技术以此为基础提出防御功耗分析的安全密码算法非常必要的。

    youdao

  • One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES).

    广泛测试成为工业界标准数据加密标准(DES远程访问认证产品最强加密算法之一。

    youdao

  • To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.

    为了使SSL会话使用加密算法散列函数规范更容易,这些算法分组各个密码套件(CipherSuite)中。

    youdao

  • The Lotus Mobile Connect clientless option, that is, Lotus Mobile Connect HTTP access services, USES the same strong authentication and encryption algorithms as the full VPN client.

    LotusMobileConnectclientless选项Lotus Mobile ConnectHTTP访问服务使用纯vpn客户端同样强大认证加密算法

    youdao

  • The Lotus Mobile Connect clientless option, that is, Lotus Mobile Connect HTTP access services, USES the same strong authentication and encryption algorithms as the full VPN client.

    LotusMobileConnectclientless选项Lotus Mobile ConnectHTTP访问服务使用纯vpn客户端同样强大认证加密算法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定