cryptography
美 [kr?p?tɑɡr?fi]
英 [kr?p?t?ɡr?fi] 
- n.密碼學(xué)
- 網(wǎng)絡(luò)密碼術(shù);加密;密碼編碼學(xué)
英漢雙解
1. | 密碼學(xué)the art of writing or solving codes |
英漢解釋
n. | 1. 密碼學(xué),密碼翻譯術(shù);密寫術(shù) |
英英解釋
例句
An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.
Java密碼擴(kuò)展系統(tǒng)的一個實現(xiàn)在Sun的網(wǎng)站中可以找到密碼服務(wù)提供者的目錄。
Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.
因此,使用量子加密將選票信息從投票站送往計票中心,也有那么點(diǎn)形象工程的色彩。
The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.
name屬性可以是位于System.Security.Cryptography命名空間中的某個抽象類的名稱。
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
由于使用了不同的密匙進(jìn)行加密和解密消息,因此這種形式的加密被稱為不對稱加密。
Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe.
量子密碼被證明是絕對安全的,其核心技術(shù)是量子密鑰分配(QKD)。
Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based.
這些技術(shù)并沒有打破量子密碼學(xué)的基礎(chǔ)理論。
The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography.
密鑰對關(guān)系中的互補(bǔ)性本質(zhì)使得通過公鑰加密實現(xiàn)這種唯一標(biāo)識成為可能。
The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world.
量子密碼術(shù)的不可侵犯性,是建立在真實世界里不見得成立的一組假設(shè)上。
OpenSSL is the cryptography library used for SSL communications, and is required by mod_ssl to encrypt HTTP traffic for Apache.
OpenSSL是用于SSL通信的密碼方法庫,并且被mod_ssl用來對Apache的HTTP通信進(jìn)行加密。
BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.
BLS短簽名是雙線性密碼學(xué)中應(yīng)用最為廣泛的密碼元件之一。
In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack.
另外,量子保密可以新的方法保護(hù)信息,從而避免經(jīng)典攻擊下的信息竊取。
Students should be able to analyse and prove the information protection capacity of modern cryptography basically after this course.
通過本課程的學(xué)習(xí),要求能夠從本質(zhì)上分析和證明現(xiàn)代密碼的信息防護(hù)能力。
The record-breaking MapReduce approach, he said, is useful in physics, cryptography and data mining.
他還介紹說,破記錄的MapReduce方法在物理學(xué),密碼學(xué)和數(shù)據(jù)挖掘領(lǐng)域也是很有用的。
One of the main applications of single-photon sources is the quantum cryptography, or exactly, the quantum key distribution (QKD).
單光子源最重要的應(yīng)用之一是量子密碼術(shù),確切的說,量子密鑰分配(QKD)。
As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered.
伴隨著技術(shù)的進(jìn)步,特別是先進(jìn)的互聯(lián)網(wǎng)和密碼學(xué)技術(shù),使得傳遞重要信息的風(fēng)險降低了。
The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography.
加密與解密數(shù)據(jù)的密鑰的安全傳輸是現(xiàn)代密碼學(xué)最棘手的問題之一。
Due to the various applications of the bilinear pairings in cryptography, there have been many pairing-based signature schemes.
由于雙線性配對函數(shù)表現(xiàn)出的良好密碼學(xué)特性,目前已經(jīng)引起了眾多關(guān)注。
Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology .
整體而言,安全與秘密通訊的學(xué)科包括密碼法與密碼分析,稱為密碼學(xué)。
The strategy included a recommended set of advanced cryptography algorithms known as "Suite B" .
該政策包括一套推薦的高級加密算法,稱為“SuiteB”。
The security of public-key cryptography depends on factorization or other difficult mathematical problems.
這種技術(shù)之所以安全,是因為應(yīng)用了因數(shù)分解或其他困難的數(shù)學(xué)問題。
Since the one-time pad is theoretically proven to be undecipherable , quantum cryptography is the key to perfect secrecy.
因為一次插入被理論上證明是不被破譯的,量密碼術(shù)是完全保密的答案。
Quantum cryptography ensures complete privacy because any attempt to observe the transmission will change the message.
由于任何企圖監(jiān)測傳輸過程的舉動都會造成所傳輸信息的改變,量子密碼術(shù)確保了傳輸的完全保密。
With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values.
使用了公開密匙加密后,希望接收已加密消息的一方將創(chuàng)建一對密匙值。
For more precise control, you can use the System. Security. Cryptography classes as well.
要進(jìn)行更精確的控制,也可以使用System.Security.Cryptography類。
A digital certificate is more than just a cryptography key; it is an online credential.
數(shù)字證書不僅僅是一個加密密鑰,它還是一個在線憑證。
Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically.
非對稱密鑰用于公鑰加密,公鑰加密使用兩個密鑰,即在數(shù)學(xué)上相關(guān)的一個公鑰和一個私鑰。
This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature.
使用該類可方便地在VB應(yīng)用程序中實現(xiàn)對稱密鑰、公開密鑰和數(shù)字簽名算法,并且不受中英文編碼方式的限制。
Be signed with a strong name using standard public key cryptography.
使用標(biāo)準(zhǔn)公鑰密碼系統(tǒng)用強(qiáng)名稱簽名。
The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).
Windows密碼API(cryptoAPI)密碼服務(wù)提供程序(CSP)的名稱。
Cryptography is the art of "secret writing, " as the word's Greek roots attest.
作為希臘的詞根資產(chǎn),加密技術(shù)是一種“神秘編寫”藝術(shù)。
The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.
公共密鑰密碼系統(tǒng)中的保密的密鑰,用于對到來的消息解密和對外出的消息簽名。
Among the mass information security technology, cryptography does undoubtedly play an important role.
在保障信息安全的眾多技術(shù)中,密碼技術(shù)無疑扮演著舉足輕重的角色。
The implementation speed of Elliptic Curve Cryptography (ECC) depends on the implementation speed of elliptic curve point multiplication.
橢圓曲線點(diǎn)乘的實現(xiàn)速度決定了橢圓曲線密碼算法(ECC)的實現(xiàn)速度。
The security of the Elliptic Curve Cryptography (ECC) is built upon the difficulty of solving the elliptic curve discrete logarithm problem.
橢圓曲線密碼體制的安全性建立在橢圓曲線離散對數(shù)問題的難解性上。
In its simplest form, a digital certificate is an asymmetric cryptography key.
數(shù)字證書的最簡單形式就是不對稱加密密鑰(asymmetriccryptographykey)。
You do not need to be an expert in cryptography to use these classes.
要使用這些類,您不必成為加密方面的專家。
The threshold cryptography is one of the most efficient and potential techniques.
門限密碼體制是解決這類問題的一種最有效和最具潛力的技術(shù)。
Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.
計算:量子密碼理論上是無法破解的。但和任何安全系統(tǒng)一樣,在實踐中其安全度取決于系統(tǒng)里最薄弱的一環(huán)。
Identity-based cryptography is a rapidly emerging approach to public-key cryptography that public keys can be arbitrary identifiers.
基于身份加密是一種以用戶的身份標(biāo)識符作為公鑰的加密體制。
Question: I'm using an X. 509 certificate with my service and I get a System. Security. Cryptography. CryptographicException.
問:我對我的服務(wù)使用的是X.509證書,并且獲得一個System.