英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The pupose of the research is to develops public key encryption and digital signature shemes based on matrix canonical decomposition problem, or matrix diagonalization problem over Z/n, the ring of integers with modulo-n addition and multiplication in particular, where n is an RSA modulus.

本课题研究基于矩阵经典分解问题,特别是Z/n上矩阵对角化问题的公钥密码与数字签名算法,其中n是一个RSA模数。新算法采用由一个矩阵多项式构成的多维单向陷门函数,其单向性由矩阵对角分解问题(即通过相似变换将矩阵化为对角型的问题)的复杂性来保障,对该函数求逆的陷门由矩阵的特征值或特征向量提供。

Understanding of the data encryption methods used by the Angel Cartel and its allies.

关于天使企业和他的盟友使用的数据密码技术方法的理解

Castanet's next version promises additional security, with password access and encryption.

下一版本的castanet将通过口令访问和加密增加安全性。

A symmetric image encryption algorithm that has a 128 bit key was proposed based on cellular neural network and coupled map lattice model.

基于细胞神经网络和耦合映像格子模型,提出了一种密钥长度为128 bit的对称图像加密算法。

Because of its cost-effective encryption and authentication framework, TESLA protocol is to be in line with the characteristic and security needs of wireless sensor networks to some extent.

TESLA协议凭借其低成本高效率的加密技术和认证框架,在一定程度上符合了无线传感器网络的特点和安全需求。

If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.

如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。

In this paper, we use a light-weight encryption scheme called Privacy Homomorphism that supports operations over ciphertext for our purpose.

因此在这篇论文中,我们利用了轻量化的加密演算法且能提供在密文上做资料计算的方法Privacy Homomorphism来达成我们的目标。

"Data encryption: Process of disguising information as " ciphertext ,"or data that will be unintelligible to an unauthorized person."

资料加密:将信息伪装成密码文件或使未经许可的人无法识别的资料的方法。

Based on the current stage of network data security is not an ideal situation, using advanced encryption algorithm and ciphertext REQUEST primer mechanism for the security of the data design.

本文基于现阶段网络数据安全并不理想的情况下,采用了先进的加密算法以及密文索机制引进行了数据安全设计。

Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.

它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。

第11/60页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
相关中文对照歌词
Headless Princess
Self Explanatory
No Church In The Wild
推荐网络例句

Based on the construction of international financial centre, we have pushed forward the explorations in the integration of cultural industries with financial services.

2010年及整个"十二五"期间,上海文化产业面临更有利的发展时机、更坚实的发展基础和更完善的发展环境。

The koala is an animal with a large bag in its body.

树袋熊用它的身体的一个大的袋子是一只动物。

"As the country descended into internecine war, daimyo tended to hold small but consolidated domains in which all the land belonged to themselves or their vassal s."

整个国家陷入内战状态之后,大名往往拥有小而巩固的领地,领地内所有土地都属于他们自己或他们的家臣。