• Stream cipher and block cipher are main cipher systems in image encryption algorithm based on bit operation.

    密码分组密码基于运算图像加密算法两种主要密码体制

    youdao

  • The listener deciphers what you said according to his own reference of blueness and transmits it to you in his own cipher.

    听者根据自己蓝色理解来破解的话,再他自己的密码传达给你。

    youdao

  • I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters.

    需要明文数据字节放在8字节加密使用密码算法所以一些字符填充最后一个不完整的块。

    youdao

  • Or it could be a cipher, in which text is converted into other text using some algorithm.

    或者可以密码的形式,通过某种算法将某种文本转换其他文本。

    youdao

  • If they do not have a cipher suite in common, then secure communication is not possible and CICS closes the connection.

    如果它们没有共通密码组合那么可能实现安全通信CICS会结束连接。

    youdao

  • You can set a minimum as well as a maximum encryption level by editing the list of cipher suites in the CIPHERS attribute on the IPCONN and TCPIPSERVICE resource definitions.

    通过编辑IPCONNTCPIPSERVICE资源定义CIPHERS属性中的密码组合列表可以设置加密级别最小值最大值

    youdao

  • In the IPCONN and TCPIPSERVICE definitions in the CICSB region, set the cipher related attributes.

    CICSB区域的IPCONNTCPIPSERVICE定义设置密码相关属性

    youdao

  • It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).

    接着抽取出的用Base 64编码密码解密密钥以及算法名称传递名为Decrypt方法(见密码术中的研究)。

    youdao

  • All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.

    一个数据库某个特定中的所有用户提供相同密码、相同的加密算法相同的加密方式进行加密。

    youdao

  • Ravi and his colleague Kevin Knight treat translation as a cryptographic problem, as if the foreign text were simply English written in an advanced cipher.

    维和同事凯文·奈特翻译当做加密问题好像外国文字也是用英文书写只不过使用了某种高级的加密方式。

    youdao

  • You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.

    这种方式继续接一生成个块密文形式

    youdao

  • One byte of cipher text is generated for every byte of plain text contained in the message.

    包含信息中的普通文本每一个字节产生密码文本的个字节。

    youdao

  • The listener then deciphers this according to his own reference of blueness and transmits it to you in his own cipher.

    然后听者根据自己蓝色理解来破解的话,再他自己的密码传达给你。

    youdao

  • Represents the cipher mode used in the symmetric algorithm.

    表示对称算法使用密码模式

    youdao

  • When you establish an SSL connection between CICS TS and TXSeries, the client and server exchange information about which cipher suites they have in common.

    CICSTSTXSeries之间建立SSL连接客户端与服务器根据它们共有的密码组合交换信息

    youdao

  • For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode.

    这个基于J2MEKerberos客户机支持一种加密算法CBC(密码分组链接cipher block chaining)模式下的DES(数据加密标准)。

    youdao

  • In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages.

    密码学历史上轻便密码秘密通讯电文加密解密

    youdao

  • In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.

    给出差分序列若干性质,对差分分析方法序列密码中的应用一些探讨给出了攻击实例

    youdao

  • In many cipher system, the pseudo random sequence generator is an important part in system security.

    许多密码系统中,随机序列生成器系统安全一个重要组成部分

    youdao

  • The zero-knowledge status authentication is a fascinating question of contemporary password research, and the elliptic curve is the cipher system having higher security in comparison with others.

    零知识身份认证当代密码研究一个引人入胜问题椭圆曲线相对于其它密码体制具有更高安全性

    youdao

  • Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.

    给出了面向连接通信协议IP密码同步解决方案安全协议的运行状态

    youdao

  • I will not write down his real name even in this bothersome Yiddish - letter cipher.

    即使是用难以辨认的意弟语字母的密码,愿意这里写下的真实姓名

    youdao

  • The P-valued logic functions satisfying K order propagation criterion have been used widely in the design of block cipher.

    满足K扩散准则的p逻辑函数密码设计重要应用

    youdao

  • The relationship between chaos and cryptography from the piontview of chaotic stream cipher and chaotic block cipher is discussed in detail.

    混沌密码混沌分组密码角度讨论了混沌密码学之间关系

    youdao

  • Antifuse FPGA used in improving velocity of cipher chip and protecting cipher algorithm is introduced in this paper. Implementation of modular in chip is presented.

    详细介绍了反熔丝fpga提高密码芯片速度对密码算法进行保护方面应用,并给出了密码算法芯片部分模块实现方法

    youdao

  • Therefore the decryption time and difficulty can be greatly increased, and the cipher can be protected from decryption in this algorithm.

    同时这种加密算法明文密码空间、密文密码空间加密强度等作了初步的分析。

    youdao

  • Owing to the recurrent stoppages of work through the air raids, arrears had accumulated in the cipher branch .

    由于空袭工作屡屡停顿,密码部门积压了许多未译电报。

    youdao

  • When decrypting the maximum length of the cipher text is the length of the modulus in bytes.

    解密密文最大长度字节长度。

    youdao

  • An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.

    分组密码设计中,提高分组密码抗差分攻击性能一个重要课题

    youdao

  • An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.

    分组密码设计中,提高分组密码抗差分攻击性能一个重要课题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定