国产高清精品免费区-男女一进一出抽搐免费视频-中日韩一二三级黄色永久视频-日韩精品人妻一区二区免费视频-日本久久视频在线观看-99热这里只有精品88热-亚洲韩国黄色最新短视频一区-日韩伦理在线观看免费全集-国产av一区二区三区天堂

cryptography

cryptography

美 [kr?p?tɑɡr?fi]  英 [kr?p?t?ɡr?fi]

  • n.密碼學(xué)
  • 網(wǎng)絡(luò)密碼術(shù);加密;密碼編碼學(xué)

英漢雙解

n.
1.
密碼學(xué)the art of writing or solving codes

英漢解釋

n.
1.
密碼學(xué),密碼翻譯術(shù);密寫術(shù)

英英解釋

n.

例句

An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.

Java密碼擴(kuò)展系統(tǒng)一個實現(xiàn)Sun網(wǎng)站可以找到密碼服務(wù)提供者目錄。

Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.

因此,使用量子加密選票信息投票送往計票中心,那么點(diǎn)形象工程色彩。

The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.

name屬性可以位于System.Security.Cryptography命名空間某個抽象名稱。

Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.

由于使用不同密匙進(jìn)行加密解密消息因此這種形式加密稱為對稱加密。

Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe.

量子密碼證明絕對安全,核心技術(shù)量子分配QKD)。

Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based.

這些技術(shù)沒有打破量子密碼學(xué)基礎(chǔ)理論

The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography.

關(guān)系互補(bǔ)性本質(zhì)使得通過公鑰加密實現(xiàn)這種唯一標(biāo)識成為可能。

The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world.

量子密碼術(shù)不可侵犯,建立真實世界不見得成立假設(shè)。

OpenSSL is the cryptography library used for SSL communications, and is required by mod_ssl to encrypt HTTP traffic for Apache.

OpenSSL用于SSL通信密碼方法并且mod_ssl用來ApacheHTTP通信進(jìn)行加密。

BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.

BLS簽名線性密碼學(xué)應(yīng)用最為廣泛密碼元件之一。

In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack.

另外量子保密可以方法保護(hù)信息,從而避免經(jīng)典攻擊信息竊取。

Students should be able to analyse and prove the information protection capacity of modern cryptography basically after this course.

通過課程學(xué)習(xí),要求能夠從本質(zhì)上分析證明現(xiàn)代密碼信息防護(hù)能力

The record-breaking MapReduce approach, he said, is useful in physics, cryptography and data mining.

介紹,記錄MapReduce方法物理學(xué)密碼學(xué)數(shù)據(jù)挖掘領(lǐng)域也是有用。

One of the main applications of single-photon sources is the quantum cryptography, or exactly, the quantum key distribution (QKD).

光子重要應(yīng)用之一量子密碼術(shù),確切量子分配QKD)。

As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered.

伴隨技術(shù)進(jìn)步,特別是先進(jìn)互聯(lián)網(wǎng)密碼學(xué)技術(shù),使得傳遞重要信息風(fēng)險降低。

The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography.

加密解密數(shù)據(jù)安全傳輸現(xiàn)代密碼學(xué)棘手問題之一。

Due to the various applications of the bilinear pairings in cryptography, there have been many pairing-based signature schemes.

由于雙線性配對函數(shù)表現(xiàn)良好密碼學(xué)特性,目前已經(jīng)引起眾多關(guān)注。

Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology .

整體而言安全秘密通訊學(xué)科包括密碼密碼分析,稱為密碼學(xué)。

The strategy included a recommended set of advanced cryptography algorithms known as "Suite B" .

政策包括一套推薦高級加密算法,稱為SuiteB”。

The security of public-key cryptography depends on factorization or other difficult mathematical problems.

這種技術(shù)之所以安全,因為應(yīng)用因數(shù)分解其他困難數(shù)學(xué)問題

Since the one-time pad is theoretically proven to be undecipherable , quantum cryptography is the key to perfect secrecy.

因為一次插入理論上證明破譯,密碼術(shù)完全保密答案。

Quantum cryptography ensures complete privacy because any attempt to observe the transmission will change the message.

由于任何企圖監(jiān)測傳輸過程舉動都會造成傳輸信息改變量子密碼術(shù)確保傳輸完全保密。

With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values.

使用公開加密,希望接收加密消息一方創(chuàng)建一對。

For more precise control, you can use the System. Security. Cryptography classes as well.

進(jìn)行精確控制,可以使用System.Security.Cryptography。

A digital certificate is more than just a cryptography key; it is an online credential.

數(shù)字證書不僅僅是一個密密一個在線憑證。

Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically.

對稱用于公鑰加密公鑰加密使用兩個,數(shù)學(xué)上相關(guān)一個公鑰一個私鑰。

This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature.

使用方便VB應(yīng)用程序實現(xiàn)對稱密鑰、公開數(shù)字簽名算法,并且英文編碼方式限制。

Be signed with a strong name using standard public key cryptography.

使用標(biāo)準(zhǔn)公鑰密碼系統(tǒng)強(qiáng)名稱簽名。

The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).

Windows密碼APIcryptoAPI密碼服務(wù)提供程序CSP名稱。

Cryptography is the art of "secret writing, " as the word's Greek roots attest.

作為希臘詞根資產(chǎn)加密技術(shù)一種神秘編寫藝術(shù)。

The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.

公共密碼系統(tǒng)保密,用于到來消息解密對外消息簽名

Among the mass information security technology, cryptography does undoubtedly play an important role.

保障信息安全眾多技術(shù),密碼技術(shù)無疑扮演舉足輕重角色。

The implementation speed of Elliptic Curve Cryptography (ECC) depends on the implementation speed of elliptic curve point multiplication.

橢圓曲線點(diǎn)實現(xiàn)速度決定橢圓曲線密碼算法ECC實現(xiàn)速度。

The security of the Elliptic Curve Cryptography (ECC) is built upon the difficulty of solving the elliptic curve discrete logarithm problem.

橢圓曲線密碼體制安全性建立橢圓曲線離散對數(shù)問題

In its simplest form, a digital certificate is an asymmetric cryptography key.

數(shù)字證書簡單形式就是不對稱密密asymmetriccryptographykey)。

You do not need to be an expert in cryptography to use these classes.

使用這些,不必成為加密方面專家。

The threshold cryptography is one of the most efficient and potential techniques.

門限密碼體制解決問題一種有效潛力技術(shù)

Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.

計算量子密碼理論上無法破解。任何安全系統(tǒng)一樣,實踐安全取決于系統(tǒng)薄弱環(huán)。

Identity-based cryptography is a rapidly emerging approach to public-key cryptography that public keys can be arbitrary identifiers.

基于身份加密一種用戶身份標(biāo)識符作為公鑰加密體制

Question: I'm using an X. 509 certificate with my service and I get a System. Security. Cryptography. CryptographicException.

服務(wù)使用X.509證書,并且獲得一個System.

熱門查詢