• On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    youdao

  • Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.

    Kerberos定义了用户密码进行处理生成一个密钥算法

    youdao

  • An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常是公开的。

    youdao

  • An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.

    现在使用这个临时密钥des -cbc算法加密第3中得到附加后的字节数组

    youdao

  • A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.

    对称算法要求消息发送方接收方使用同一个通常被称作秘钥密码术

    youdao

  • Kerberos defines an algorithm to generate a secret key from the user's password.

    Kerberos定义一种利用用户密码生成密钥算法

    youdao

  • So far, I have discussed the low-level methods of the ASN1DataTypes class and implemented the algorithm for generating a secret key from the user's password.

    到目前为止讨论了ASN1DataTypes底层方法实现了利用用户密码生成密钥算法

    youdao

  • Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key.

    基于时间缓存攻击是指通过分析处理器算法不同执行时间恢复密钥攻击。

    youdao

  • The advantages of this algorithm were, rapidity of encryption, carried out easily by computer, ampliative secret key space and so on.

    算法加密速度快易于计算机实现密钥空间优点

    youdao

  • The secret key of next period is derived from the current secret key via key-update algorithm which is arranged in system after a period end.

    每个周期结束时,利用周期,由系统设置好的更新算法产生一个周期

    youdao

  • The secret key of next period is derived from the current secret key via key-update algorithm which is arranged in system after a period end.

    每个周期结束时,利用周期,由系统设置好的更新算法产生一个周期

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定