Stream cipher and block cipher are main cipher systems in image encryption algorithm based on bit operation.
流密码与分组密码是基于位运算的图像加密算法中两种主要密码体制。
The listener deciphers what you said according to his own reference of blueness and transmits it to you in his own cipher.
听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。
I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters.
我对需要将明文数据字节放在8字节块的加密使用块密码算法,所以我用一些字符填充最后一个不完整的块。
Or it could be a cipher, in which text is converted into other text using some algorithm.
或者可以是密码的形式,通过某种算法将某种文本转换为其他文本。
If they do not have a cipher suite in common, then secure communication is not possible and CICS closes the connection.
如果它们没有共通的密码组合,那么就不可能实现安全通信,CICS会结束连接。
You can set a minimum as well as a maximum encryption level by editing the list of cipher suites in the CIPHERS attribute on the IPCONN and TCPIPSERVICE resource definitions.
通过编辑IPCONN和TCPIPSERVICE资源定义上的CIPHERS属性中的密码组合列表,您可以设置加密级别的最小值和最大值。
In the IPCONN and TCPIPSERVICE definitions in the CICSB region, set the cipher related attributes.
在CICSB区域的IPCONN和TCPIPSERVICE定义中,设置与密码相关的属性。
It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).
接着它将抽取出的用Base 64编码的密码值、解密密钥以及算法名称传递给名为Decrypt的方法(见密码术中的研究)。
All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.
一个数据库表中某个特定列中的所有值都以用户提供的相同密码、相同的加密算法和相同的加密方式进行加密。
Ravi and his colleague Kevin Knight treat translation as a cryptographic problem, as if the foreign text were simply English written in an advanced cipher.
拉维和他的同事凯文·奈特把翻译当做加密问题,好像外国文字也是用英文书写,只不过使用了某种高级的加密方式。
You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.
以这种方式继续一块接一块地生成每一个块的密文形式。
One byte of cipher text is generated for every byte of plain text contained in the message.
对包含在信息中的普通文本的每一个字节产生密码文本的一个字节。
The listener then deciphers this according to his own reference of blueness and transmits it to you in his own cipher.
然后听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。
Represents the cipher mode used in the symmetric algorithm.
表示对称算法中使用的密码模式。
When you establish an SSL connection between CICS TS and TXSeries, the client and server exchange information about which cipher suites they have in common.
在CICSTS与TXSeries之间建立SSL连接时,客户端与服务器根据它们共有的密码组合交换信息。
For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode.
对这个基于J2ME的Kerberos客户机,我将只支持一种加密算法,即CBC(密码分组链接cipher block chaining)模式下的DES(数据加密标准)。
In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages.
在密码学的历史上,谜是一轻便的密码机可将秘密通讯电文加密和解密。
In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.
给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
In many cipher system, the pseudo random sequence generator is an important part in system security.
在许多密码系统中,伪随机序列生成器是系统安全的一个重要组成部分。
The zero-knowledge status authentication is a fascinating question of contemporary password research, and the elliptic curve is the cipher system having higher security in comparison with others.
零知识身份认证是当代密码研究的一个引人入胜的问题,而椭圆曲线相对于其它密码体制具有更高安全性。
Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
给出了面向非连接通信协议IP层的密码同步的解决方案和安全协议的运行状态图。
I will not write down his real name even in this bothersome Yiddish - letter cipher.
即使是用难以辨认的意弟绪语字母的密码,我也不愿意在这里写下他的真实姓名。
The P-valued logic functions satisfying K order propagation criterion have been used widely in the design of block cipher.
满足K次扩散准则的p值逻辑函数在密码设计中有重要应用。
The relationship between chaos and cryptography from the piontview of chaotic stream cipher and chaotic block cipher is discussed in detail.
从混沌流密码和混沌分组密码的角度讨论了混沌和密码学之间的关系。
Antifuse FPGA used in improving velocity of cipher chip and protecting cipher algorithm is introduced in this paper. Implementation of modular in chip is presented.
详细介绍了反熔丝fpga在提高密码芯片速度和对密码算法进行保护方面的应用,并给出了密码算法芯片中部分模块的实现方法。
Therefore the decryption time and difficulty can be greatly increased, and the cipher can be protected from decryption in this algorithm.
同时对这种加密算法的明文密码空间、密文密码空间和加密强度等作了初步的分析。
Owing to the recurrent stoppages of work through the air raids, arrears had accumulated in the cipher branch .
由于在空袭中工作屡屡停顿,密码部门积压了许多未译的电报。
When decrypting the maximum length of the cipher text is the length of the modulus in bytes.
当解密的密文的最大长度是在字节模长度。
An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.
在分组密码的设计中,提高分组密码的抗差分攻击性能是一个重要的课题。
An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.
在分组密码的设计中,提高分组密码的抗差分攻击性能是一个重要的课题。
应用推荐