decryption
美 [di'kr?p?n]
英 [di:'kr?p?n] 
- n.解釋編碼的數(shù)據(jù)
- 網(wǎng)絡(luò)解密;譯碼;解密模塊
英漢解釋
例句
Note that decryption uses the corresponding private key of the public key used for encrypting the XML.
請(qǐng)注意,解密過程使用的是加密XML時(shí)使用的公鑰所對(duì)應(yīng)的私鑰。
The CSP generates the public and private key pair used for the encryption and decryption of messages.
CSP生成用于信息加密和解密的公鑰和私鑰對(duì)。
On decryption, each event is written to disk, unencrypted, and the plain text read back in to be displayed to the user.
在解密階段,每個(gè)事件都被寫到磁盤上,然后進(jìn)行解密,最后讀回純文本并顯示給用戶。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
該系統(tǒng)能有效的防止網(wǎng)絡(luò)內(nèi)部的重要數(shù)據(jù)通過網(wǎng)絡(luò)泄露出去,無需用戶進(jìn)行手動(dòng)的加密解密操作。
The recipient's unique information is then used in a decryption operation performed against the encrypted message .
然后,使用收件人的唯一信息對(duì)加密郵件執(zhí)行解密操作。
This book reveals the Windows platform for a comprehensive encryption and decryption technology!
本書全面揭示Windows平臺(tái)的加密與解密技術(shù)!
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.
公鑰加密湜使苚弌對(duì)非對(duì)稱菂密鑰加密或解密菂技術(shù)。
The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1].
公鑰系統(tǒng)采用一對(duì)數(shù)學(xué)上相關(guān)的序列,一個(gè)用于加密,另一個(gè)用于解密。
If the private key is encrypted with a password in the database, the decryption password must be specified.
如果在數(shù)據(jù)庫(kù)中使用密碼對(duì)私鑰進(jìn)行加密,則必須指定解密密碼。
The result of simulation shows that the algorithm can give satisfactory result of encryption and decryption.
仿真結(jié)果表明,該算法具有很好的加密、解密結(jié)果。
The DECRYPTION BY PASSWORD clause can be omitted if the password in the file is protected with a null password.
如果文件中的密碼受空密碼保護(hù),則可省略DECRYPTIONBYPASSWORD子句。
It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption.
介紹一種結(jié)合數(shù)字水印技術(shù)解決動(dòng)態(tài)加解密密鑰安全性的設(shè)計(jì)方案。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
對(duì)稱算法非常有效,并且可以與用于加密和解密計(jì)算的單一密鑰一起使用。
In public-key or two-key encryption, a key pair is used for encryption and decryption.
公鑰加密是使用一對(duì)非對(duì)稱的密鑰加密或解密的技術(shù)。
It is capable of message digests, encryption and decryption of files, digital certificates, digital signatures, and random numbers.
它可以實(shí)現(xiàn)消息摘要、文件的加密和解密、數(shù)字證書、數(shù)字簽名和隨機(jī)數(shù)字。
Instead, the other key in the pair must be used for the decryption.
相反,這對(duì)密匙值的另外一個(gè)密匙必須用于解密。
A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format.
保護(hù)程序是一種可以控制對(duì)特定文件格式的權(quán)限管理文件進(jìn)行加密和解密的程序。
Sets the key being used for Passport encryption and decryption.
設(shè)置用于Passport加密和解密的密鑰。
This process of changing information into a code is encryption and the process of changing code back is decryption .
將信息更改為代碼的這一過程稱為加密,而將代碼重新更改為信息的過程則稱為解密。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三節(jié)中,我將展示如何生成一個(gè)用于在Kerveros通信中進(jìn)行加密和解密的密鑰。
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密過程或解密過程一般被稱作密碼術(shù),且依賴于數(shù)學(xué)算法。
Keys are used for digitally signing documents and verifying signatures , and they help with the encryption and decryption processes .
密鑰用于數(shù)字簽署文檔和驗(yàn)證簽名,也用于加密和解密過程。
The string manipulation functions in Listing 13 replace the lost formatting before the decryption command is called.
在調(diào)用解密命令之前,清單13中的字符串操作函數(shù)將替換丟失的格式。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非對(duì)稱加密執(zhí)行數(shù)字簽名與驗(yàn)證、加密和解密。
Its encryption and decryption operations are in the system drive layer and the whole process is completely transparent.
加解密操作均在系統(tǒng)的驅(qū)動(dòng)層實(shí)現(xiàn),整個(gè)過程對(duì)用戶完全透明的特點(diǎn)。
Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key .
此類非對(duì)稱轉(zhuǎn)換較比使用對(duì)稱密鑰進(jìn)行加密和解密的方法,其開銷更大。
Encryption and decryption of a cookie are performed by the same Client Access server.
Cookie的加密和解密由同一臺(tái)客戶端訪問服務(wù)器執(zhí)行。
Security -- authorization of the request, encryption and decryption as required, validation, etc.
安全性——請(qǐng)求的授權(quán)、加密和解密(在需要時(shí))、確認(rèn)等等
The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation.
RSA算法的解密性能與大數(shù)模冪運(yùn)算的實(shí)現(xiàn)效率有著直接的關(guān)系。
Decryption: The decryption ability reveals all enemy movements within a sector. Orders are represented by red arrows.
解密:解密才干可揭露指定分區(qū)中友好部隊(duì)的意向,并以紅色箭頭表示。
You must specify the validation key, decryption key, and the type of encryption used for validation of data.
必須指定驗(yàn)證密鑰、解密密鑰以及用于數(shù)據(jù)驗(yàn)證的加密類型。
GOST encryption standards the former Soviet Union, the former Soviet Union, a Chinese encryption and decryption of the source code.
gost前蘇聯(lián)加密標(biāo)準(zhǔn),前蘇聯(lián)的一中加密解密的源代碼。
Symmetric encryption and decryption is relatively fast, and is suitable for working with large amounts of data.
對(duì)稱加密和解密速度相對(duì)較快,適于處理大量數(shù)據(jù)。
Concentration of this 3-year domestic encryption and decryption technology, a very worthy collection!
濃縮了這3年來國(guó)內(nèi)加密與解密技術(shù)的發(fā)展,非常值得收藏!
Step 5: The final step in the decryption process is to call either the decryptInPlace or decrypt method on the Decryptor object.
步驟5:解密過程的最后一個(gè)步驟是在Decryptor對(duì)象中調(diào)用decryptInPlace或者decrypt方法。
a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion.
一種非線性流式加密算法,對(duì)稱加密,它的加密和解密都是用同一把密鑰完成。
In order to perform the decryption, the receiver must be in possession of a special piece of data called the key.
為了進(jìn)行解密,接收者必須有稱為密鑰的特殊數(shù)據(jù)。
At decryption time, the same authenticator must be passed to DecryptByKey.
解密時(shí),必須將同一驗(yàn)證器傳遞給。
This paper introduces a number of encryption and decryption technologies on commonly used software.
介紹常用軟件加密和軟件破解的一些方法。
Access code availability is further controlled by selectively providing for updates of decryption access codes.
接著存取碼可用性由選擇地提供用于更新解密存取碼控制。