Triple DES is a variation of DES, with a key length of 168 bits.
TripleDES是 DES的一个变体,密钥长 168位。
Size of file being encrypted isn't limited, minimal key length - 8 characters.
对加密文件的大小是没有限制,最小密钥长度-8个字符。
The combination of encryption algorithm and the key length governs the strength of the encryption type.
加密算法和密钥长度的组合决定加密类型的强度。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.
算法和密钥长度的组合产生强加密、中等加密和弱加密。
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
即美国国家数据加密标准(the United States DataEncryption Standard),是一个块密码算法,块长8字节,密钥长56位。
Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.
同其它非对称加密体制相比,ECC被认为能提供更高的加密强度,并具有更快的执行速度和更小的密钥长度。
Different implementations were compared in storage space and processing speed and a variety of different key length algorithm performances were given.
对算法的不同实现方式所占的存储空间和运算速度进行了比较,并给出了不同密钥长度算法的各种性能指标。
Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.
要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。
This paper introduces an optimization of Advanced Encryption Standard (AES) with 128-bit block length and key length. It can speed up execution on ARM microprocessor.
提出一种高级加密标准(aes)算法的优化方案,适合在ARM处理器上运行长度均为128位的明文和密钥。
After a simple check to ensure the two passwords are of equal length, each key is then matched in the entire password - ensuring that the fifth character is a zero in both passwords, for example.
在经过简单的检查确保两个密码长度相等之后,将在整个密码中匹配各个键——例如,确保两个密码中的第五个字符是零。
If the passwords collected all of the required key press and key releases, are the same length, and contain all the same characters, a match was found and the subroutine exits successfully.
如果收集了所有必需的按键和释放操作的密码长度都相同并且包含相同的字符,则找到一个匹配并且子例程成功退出。
The key to using the method for validation is to compare the updated index to the length of the original input string.
使用该方法验证的关键在于将更新过的索引和初始输入字符串的长度进行比较。
To do so, you would specify the action as an array key and the length of time to keep the views in cache, much like you did above.
为此,把这个操作指定为数组键并指定在缓存中保留视图的时间长度,像上面一样。
The difference between the encryption types is the strength of algorithm and length of the key being used.
不同加密类型之间的差异在于算法的强度和使用的密钥长度。
The first key is 21 bytes long (the byte length is shown in parentheses [()]) and is called GLOBALS/c_setprinter followed by a NULL, which is ASCII zero.
第一个键为21字节(字节长度显示在括号中 [()]),被称为GLOBALS/c_setprinter,后跟NULL,其为ASCII 码零。
To illustrate this, let's first define a simple RectangularObject class, which exposes three key properties to the configuration API: the length, width, and height.
作为一个例子,首先定义简单的rectangularobject类,它向配置API公开了三个主要属性:长、宽和高。
The metadata cache contains the full path names of directories and files as keys and metadata (e.g. file length, last modification date, and whether the key is a file or a directory) as values.
元数据缓存器将目录和文件的路径名称保存为键,将元数据保存为值(如文件长度、最后修改时间、标记该条目是文件还是目录等)。
The [key] annotation specifies that a property is the entity's primary key, while [StringLength (512)] specifies the maximum length of a string property.
注解所指定的属性是实体的主键,[stringlength(512)]指定了字符串属性的最大长度值。
For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.
要数字签署大型文件,首先使用这些算法用一种安全的方式压缩(计算固定长度的哈希码)文件,然后再用私钥签署。
"The key thing is that such experiments are sensitive to changes in the length of the rulers that are far smaller than the diameter of a proton, " says Hogan.
“关键点在于,这一实验能够辨识出极其微小的长度变化,哪怕比质子的直径还要小。”霍根说。
To take maximum advantage of the encryption algorithm, your key should be 32 characters in length (128 bits).
为了发挥加密算法的最大优势,你的解密钥匙需要被设置为32个字符长度为128比特。
Key type automatic gearbox is used to adjusting the cutting of paper length.
采用链条式无级变速箱调整切纸长短。
We discuss at length the properties of a very important class of kernels which lead to the key notion of Reproducing kernel Hilbert Space (RKHS).
我们将详细的讨论核心课程中十分重要的特质,其引导出再生核希尔伯特空间理论(RKHS)中一个非常关键的概念。
Under similar secure conditions, the ECC has the advantages such as: less computation amounts, shorter length of private key, smaller storing and bandwidth.
在相同安全强度条件下,椭圆曲线密码体制具有较短的密钥长度,较少的计算量、存储量和较小的带宽等诸多优点。
The key point of this research was to identify the threshold of ramp metering and how to combine the ALINEA algorithm with the restriction of the queue length.
介绍了该系统控制方法实现的关键部分,匝道控制阈值的确定以及如何将ALINEA算法与匝道排队长度约束相结合。
The key point of this research was to identify the threshold of ramp metering and how to combine the ALINEA algorithm with the restriction of the queue length.
介绍了该系统控制方法实现的关键部分,匝道控制阈值的确定以及如何将ALINEA算法与匝道排队长度约束相结合。
应用推荐