The number that you choose to rotate your letters by is what we call in cryptography, a key.
你选择的旋转字母的数量就是我们在密码学中所说的密匙。
In cryptography, we also need to discuss modular logarithm.
在密码学中,我们也需要讨论模对数。
Shiro’s goal in cryptography is to simplify and make usable the JDK’s cryptography support.
在加密方面,Shiro的目标是简化并让JDK的加密支持可用。
In this paper we survey some recent results and suggest some new directions in cryptography.
本文简要评述近代密码学研究的新成果,并且提出密码学的若干新的研究方向。
In cryptography, the result of securing a block of data by applying a cryptographic function.
利用加密函数对数据块加密的结果。
The random Numbers used in cryptography are often required to hold the unpredictable characteristic.
在密码学中,通常要求所使用的随机数具有不可预测性。
ECC is a new field in cryptography, this crypt system has many advantages of fast speed and high security.
基于椭圆曲线的公钥密码体制是密码学研究的一个新课题,这种密码体制具有速度快、全性高的优点。
In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers.
密码学中,由替代密码和置换密码结合使用而构成的一种密码。
The application of chaos in cryptography has attracted much attention, however, most of them were cracked soon after publications.
基于混沌的密码算法设计引起了广泛的讨论,然而,大多数混沌密码算法发表不久即被攻击。
The problem of secure multiparty computation is fundamental in cryptography, as well as relevant to practical cryptographic applications.
安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。
It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).
接着它将抽取出的用Base 64编码的密码值、解密密钥以及算法名称传递给名为Decrypt的方法(见密码术中的研究)。
With the development of computing technology and cryptography, high-speed digital physical noise generator is urgently required in cryptography at present.
由于数字物理噪声源可以产生随机性较好的随机数作为密钥,已被广泛应用于安全信息系统。
In cryptography security, a method of applying additional security to a key utilizing the identities of both the originator, and also the ultimate recipient.
在密码安全学中,一种对密钥施加额外保护的方法,它利用了编码者与最终用户的一致性。
The efficiency of implementations in cryptosystems is one of the hottest aspects in cryptography. Modifying and optimizing different algorithms is common approach to achieve efficiency.
密码体制的快速实现是密码学界关注的热点之一,其中各算法实现的改进和优化是研究的重要内容。
Next time: In our next installment of this series of articles, we will discuss and implement the details of cryptography.
下一次:在这一系列文章的下一部分中,我们将讨论并实现密码术的细节。
This mysterious property, known as entanglement, has far reaching application potential in information fields such as quantum cryptography, quantum computation and quantum teleportation.
这个神秘的“纠缠”性质,在通信领域具有深远的应用潜力,如量子密码学,量子计算和量子隐态传输。
This mysterious property, known as “entanglement”, has far reaching application potential in information fields such as quantum cryptography, quantum computation and quantum teleportation.
这个神秘的“纠缠”性质,在通信领域具有深远的应用潜力,如量子密码学 ,量子计算和量子隐态传输 。
Even if the data is not sensitive or personal, it should be secured with cryptography when transported to and from, and manipulated in, the cloud.
即使数据不是敏感数据或个人数据,在云中传输和操纵数据时也应该用密码技术加以保护。
Secret key cryptography is one of the most important technologies in distributed systems security.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
To learn more about cryptography and SSL issues, browse the articles and tutorials listed in the Resources section later in this article.
要了解更多有关加密和SSL问题的信息,请参阅在本文后面参考资料中所列出的文章和教程。
The outer layers (people) depend on middle layers (computers and networks), which in turn rely on the innermost layers (cryptography and protocols).
最外层(人)依赖中间层(计算机和网络),中间层又依赖于最里层(密码学和协议)。
Given that he's become something of a cryptography celebrity in the past year (e.g. he's been profiled in Forbes magazine), one would have to think his application will get a thorough read.
于去年他已经成为某种程度上的密码学名人(比如,他已经登上了福布斯杂志),人们不由地会想,他的申请将会得到重视。
More research and advances in the searchable cryptography field are necessary before this approach becomes a viable solution for a virtual private storage service.
在可搜索的加密方法成为虚拟的私有存储服务的可行的解决方案之前,在该领域还需要更多的研究和提高。
In quantum cryptography, as in most long-distance data transmission, the information is carried by photons, the particles which compose light and other sorts of electromagnetic radiation.
光子是光线和其它种类电磁辐射的构成粒子,同大部分的远距离数据传输方法一样,量子加密法中信息是通过光子传输的。
They may have their work cut out, however, as Julian Assange has a strong knowledge of cryptography, having developed cryptographic software in the past.
它们本是无计可施只能停止破译,但是朱利安·艾桑伊对密码术了解甚多,以前曾设计过用密码编写的软件,破译工作看到了曙光。
Quantum cryptography, however, will soon pass into the quotidian realm if Andrew Shields and his colleagues at Toshiba’s research laboratory in Cambridge have anything to do with it.
不过,如果安德鲁谢尔兹(AndrewShields)和他的剑桥东芝研究实验室同事们进展顺利的话,量子密码学将很快进入日用范畴。
The two areas where Shiro really focuses its cryptography support is in the areas of cryptographic hashes (aka message digests) and cryptographic ciphers.
对于加密支持,Shiro真正关注的两个领域是加密哈希(又名消息摘要)和加密密码。
The two areas where Shiro really focuses its cryptography support is in the areas of cryptographic hashes (aka message digests) and cryptographic ciphers.
对于加密支持,Shiro真正关注的两个领域是加密哈希(又名消息摘要)和加密密码。
应用推荐