英语人>网络例句>cryptanalytic 相关的网络例句
cryptanalytic相关的网络例句

查询词典 cryptanalytic

与 cryptanalytic 相关的网络例句 [注:此内容来源于网络,仅供参考]

As a variant of differential cryptanalysis, impossible differential cryptanalysis is a simple and effective technique, and it is also one of the most frequently used cryptanalytic methods.

不可能差分分析作为差分分析的一种变体,是一种简单有效的密码分析方法,也是目前最常用的密码分析方法之一。

Especially after a series of impossible differential attacks on AES has been published, it is now considered to be one of the most effective cryptanalytic methods on AES.

尤其是近年来对AES的攻击,得到了一系列非常好的攻击结果,使得不可能差分分析已成为对AES最有效的攻击方法之一。

Early interest in cryptanalytic research led to the first large-scale computer and the first solid-state computer, predecessors to the modern computer.

早期的兴趣导致了首个大型计算机和第一固态计算机密码分析研究,对现代计算机的前身。

A lot of applied cryptosystems we use now are computational secure, but with the progress of computational power and cryptanalytic technique, the cryptosystems that are computational secure will become more and more insecure, so it will be more and more important to study theoretical security of cryptosystem.

目前我国在密码技术的应用水平方面与国外还有一定的差距。现在许多实用的密码体制都是计算安全的,但是随着计算能力的提高和密码分析的技术进步,计算安全的密码体制将会越来越不安全,因此,密码体制的理论安全研究越来越重要。

Some initial cryptanalysis and detailed statistical tests of SCF are given, the results show that SCF can resist some known cryptanalytic attacks and has excellent statistical properties.

并且对SCF作了一些初步的密码分析和详细的统计测试,结果表明:SCF密码足够抵抗一些已知的密码分析、具有很好的统计性能。

Security analyses of a variant of a new block cipher system based on cellular automata theory are given using two cryptanalytic approaches. The results show that this variant of CAC is very insecure under chosen-plaintext attacks.

利用两种方法对一个基于细胞自动机的分组密码系统CAC的变形进行了分析,结果表明:CAC的这种变形在选择明文攻击下是极不安全的。

Al[49]. In that conference, Wang announced the presence of collisions within for MD4, MD5, HAVAL-128 and RIPEMD that was regarded as the most significant cryptanalytic developments of the year.

同年,Chahaud和Joux使用差分分析的方法,也给出了SAH-0的理论分析结果,这一结果发表在1998年的美密会上。

MD5 was designed because it was felt that MD4 was perhaps ' being adopted for use more quickly than justified by the existing ' critical review; because MD4 was designed to be exceptionally fast,' it is "at the edge" in terms of risking successful cryptanalytic ' attack.

比如,在UNIX下有很多软件在下载的时候都有一个文件名相同,文件扩展名为。md5的文件,在这个文件中通常只有一行文本,大致结构如: MD5 (tanajiya.tar.gz)= 0ca175b9c0f726a831d895e269332461 这就是tanajiya.tar.gz文件的数字签名。

Secondly, the pseudo-chaotic stream cipher based on searching plaintext in a pseudo-random symbolic sequence is analyzed, by several successful cryptanalytic attacks such as one-time pad attacks, bifurcation diagram attacks, entropy attacks, differential attacks and key recovery attacks etc..

第二章研究了基于搜索机制的数字混沌序列密码算法,并详细分析了包括一次一密攻击,分叉图攻击,熵攻击,差分攻击以及基于符号动力学的攻击方法。

推荐网络例句

I use an example quoted by Hu Jiaqi:"It is reported that America separates the DNA of a kind of virus by making use of genetic technology and combines it with another kind of DNA. Finally, they get a kind of virulent biological agent called a "pyrotoxin". Someone discloses in private that 20 grams of such a kind of biological agent could result in the global death of 6 billion people due to infection."

我在这里例举胡家奇所引用过的例子:"据报道,美国利用转基因技术,将一种病毒的DNA分离出来,与另外一种DNA进行结合,拼结成一种剧毒的"热毒素"生物战剂,且私下有人透露,这种生物战剂只需20克,就可以导致全球60亿人全部感染死亡。"

Waiting, for the queers and the coons and the Reds and the Jews.

等待着疯子和黑人还有红色共产主义者还有犹太人

"Everybody talks about what a horrible job it is to brief the press,but I love these briefings!"

&每个人都说,简报新闻是一份多么糟糕的工作,,但是我爱这些简报。&