The new algorithm can use a variable length key, and its output is 256-bit message authentication code(MAC).
新算法具有一个可变长度密钥,输出2 5 6位的报文鉴别码(MAC)。
The combination of encryption algorithm and the key length governs the strength of the encryption type.
加密算法和密钥长度的组合决定加密类型的强度。
After a simple check to ensure the two passwords are of equal length, each key is then matched in the entire password - ensuring that the fifth character is a zero in both passwords, for example.
在经过简单的检查确保两个密码长度相等之后,将在整个密码中匹配各个键——例如,确保两个密码中的第五个字符是零。
Sort key length will not be affected unless the strength level is also increased.
这个属性不影响排序键的长度,除非还增加了强度级。
If the passwords collected all of the required key press and key releases, are the same length, and contain all the same characters, a match was found and the subroutine exits successfully.
如果收集了所有必需的按键和释放操作的密码长度都相同并且包含相同的字符,则找到一个匹配并且子例程成功退出。
The key to using the method for validation is to compare the updated index to the length of the original input string.
使用该方法验证的关键在于将更新过的索引和初始输入字符串的长度进行比较。
The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.
算法和密钥长度的组合产生强加密、中等加密和弱加密。
To do so, you would specify the action as an array key and the length of time to keep the views in cache, much like you did above.
为此,把这个操作指定为数组键并指定在缓存中保留视图的时间长度,像上面一样。
Specify the record length as 80 and the key length as 5.
指定记录长度为80,键长度为5。
The first key is 21 bytes long (the byte length is shown in parentheses [()]) and is called GLOBALS/c_setprinter followed by a NULL, which is ASCII zero.
第一个键为21字节(字节长度显示在括号中 [()]),被称为GLOBALS/c_setprinter,后跟NULL,其为ASCII 码零。
To illustrate this, let's first define a simple RectangularObject class, which exposes three key properties to the configuration API: the length, width, and height.
作为一个例子,首先定义简单的rectangularobject类,它向配置API公开了三个主要属性:长、宽和高。
For an index key column that is of variable length.
具有可变长度的索引键列。
Triple DES is a variation of DES, with a key length of 168 bits.
TripleDES是 DES的一个变体,密钥长 168位。
The metadata cache contains the full path names of directories and files as keys and metadata (e.g. file length, last modification date, and whether the key is a file or a directory) as values.
元数据缓存器将目录和文件的路径名称保存为键,将元数据保存为值(如文件长度、最后修改时间、标记该条目是文件还是目录等)。
The [key] annotation specifies that a property is the entity's primary key, while [StringLength (512)] specifies the maximum length of a string property.
注解所指定的属性是实体的主键,[stringlength(512)]指定了字符串属性的最大长度值。
The difference between the encryption types is the strength of algorithm and length of the key being used.
不同加密类型之间的差异在于算法的强度和使用的密钥长度。
For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.
要数字签署大型文件,首先使用这些算法用一种安全的方式压缩(计算固定长度的哈希码)文件,然后再用私钥签署。
"The key thing is that such experiments are sensitive to changes in the length of the rulers that are far smaller than the diameter of a proton, " says Hogan.
“关键点在于,这一实验能够辨识出极其微小的长度变化,哪怕比质子的直径还要小。”霍根说。
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
即美国国家数据加密标准(the United States DataEncryption Standard),是一个块密码算法,块长8字节,密钥长56位。
To take maximum advantage of the encryption algorithm, your key should be 32 characters in length (128 bits).
为了发挥加密算法的最大优势,你的解密钥匙需要被设置为32个字符长度为128比特。
Key type automatic gearbox is used to adjusting the cutting of paper length.
采用链条式无级变速箱调整切纸长短。
We discuss at length the properties of a very important class of kernels which lead to the key notion of Reproducing kernel Hilbert Space (RKHS).
我们将详细的讨论核心课程中十分重要的特质,其引导出再生核希尔伯特空间理论(RKHS)中一个非常关键的概念。
The key point of this research was to identify the threshold of ramp metering and how to combine the ALINEA algorithm with the restriction of the queue length.
介绍了该系统控制方法实现的关键部分,匝道控制阈值的确定以及如何将ALINEA算法与匝道排队长度约束相结合。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
Some positions require a strict master, it is not necessary. You feel comfortable is the best. The length of time is the key.
有的大师要求姿势严格,这是没有必要的。你感觉舒服是最好的。时间的长度是最关健的。
Under similar secure conditions, the ECC has the advantages such as: less computation amounts, shorter length of private key, smaller storing and bandwidth.
在相同安全强度条件下,椭圆曲线密码体制具有较短的密钥长度,较少的计算量、存储量和较小的带宽等诸多优点。
Under similar secure conditions, the ECC has the advantages such as: less computation amounts, shorter length of private key, smaller storing and bandwidth.
在相同安全强度条件下,椭圆曲线密码体制具有较短的密钥长度,较少的计算量、存储量和较小的带宽等诸多优点。
应用推荐