英语人>网络例句>密码分析的 相关的搜索结果
网络例句

密码分析的

与 密码分析的 相关的网络例句 [注:此内容来源于网络,仅供参考]

With their Enigma-like machine, built thanks to the German documents they received from the French, and later with a more advanced machine they nicknamed "Bombe", the Polish code breakers successfully deciphered German Enigma messages for over six years until 1938, and they did not tell the French anything about it...

多亏了法国人提供的德国绝密文件,他们仿造出一台恩尼格码机。此后,以此为基础,他们又造出了被他们昵称为"炸彈"的高级密码分析仪器。在1938年以前的6年时间里,波兰方面成功地破译了德国的恩尼格码信息。此事被波兰视为绝对机密,即使对法国人也守口如瓶。

The cryptanalysis andapplication study of AES are becoming more and more importance.

AES的密码分析和应用研究已越来越受到人们的重视。

Using unrelated algorithms is an important step in allowing the random data to be used to make cryptanalysis more difficult.

使用无关的算法是一个重要的步骤,让随机数据被用来作密码分析更加困难。

If a cryptanalyst thinks that a user has used the same key to encrypt two different files, he can XOR the two files together and cancel out the output from the PRNG.

如果密码分析认为,在用户使用相同的密钥来加密两个不同的文件,他可以异或两个文件一起,并取消了从PRNG输出。

We show that unless a cryptanalyst can completely break the RSA encryption ,any heuristic oracle he uses to determine the least significant bit of the cleartext must have an error probability greater than 1/2-ε.

证明了,对于任意用于确定RSA明文的最后一个有效位的启示,必须有大于1/2-ε的出错概率,否则密码分析人员能够完全破译RSA。

In the end of the chapter, the security of several kinds of important cryptographic functions is deeply analyzed.

本章末,利用这些安全性指标分析了几类重要的密码函数的安全性。

The characteristics of identity-based cryptosystem and identity-based group signature scheme are analyzed.

分析了基于身份的公钥密码系统的特点和基于身份的群签名方案。

Methods Polymerase chain reaction was used to detect HPV 16 DNA and point mutation at condon 12 of Ha-ras oncogene.

应用多聚酶链反应技术扩增HPV16 DNA和Ha-ras癌基因相关片段,分别采用2%琼脂糖凝胶电泳和限制性片段长度多态性分析,检测口腔癌中的HPV16 DNA和Ha-ras癌基因第12位密码子的点突变。

Security analysis of the key stream generators is always at the central of the research on stream ciphers.

对密钥流生成器的安全性分析一直是序列密码研究的中心课题。

Early interest in cryptanalytic research led to the first large-scale computer and the first solid-state computer, predecessors to the modern computer.

早期的兴趣导致了首个大型计算机和第一固态计算机密码分析研究,对现代计算机的前身。

第6/15页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

What are your goals and strategies for growth?

你的成长目标和策略是什么?

And unto the angel of the church in Sardis write; These things saith he that hath the seven irits of God, and the seven star I know thy works, that thou hast a name that thou livest, and art dead.

3:1 你要写信给撒狄教会的使者,说,那有神的七灵和七星的,说,我知道你的行为,按名你是活的,其实是死的。

"It is a testament to making sure unemployment compensation is available, making sure we are looking out for people who have lost their jobs," she said.

"这是个实证,证明我们必须确保人们都可以得到失业补偿,确保那些失去工作的人们得到照顾。"