亚洲精品视频一区二区,一级毛片在线观看视频,久久国产a,狠狠狠色丁香婷婷综合久久五月,天天做天天欢摸夜夜摸狠狠摸

當前位置: > 投稿>正文

cryptography是什么意思,cryptography中文翻譯,cryptography怎么讀、發(fā)音、用法及例句

2025-06-29 投稿

?cryptography

cryptography 發(fā)音

英:[kr?p't?gr?f?]  美:[kr?p'tɑgr?fi]

英:  美:

cryptography 中文意思翻譯

常見(jiàn)釋義:

n.密碼學(xué);密碼使用法

cryptography 詞性/詞形變化,cryptography變形

副詞: cryptographically |形容詞: cryptographic |

cryptography 短語(yǔ)詞組

1、cryptography and network security pdf ─── 密碼學(xué)與網(wǎng)絡(luò )安全pdf

2、public key cryptography ─── [計] 公開(kāi)鑰密碼

3、cryptography table ─── 加密表

4、number theory and cryptography ─── 數論與密碼學(xué)

5、computer cryptography ─── [計] 計算機密碼術(shù)

6、cryptography is often used ─── 密碼學(xué)經(jīng)常被使用

7、cryptography types ─── 加密類(lèi)型

8、cryptography key ─── 密鑰

9、obfuscation cryptography ─── 模糊加密

10、cryptography meaning in english ─── 英語(yǔ)中的密碼學(xué)意義

11、cryptography certificate ─── 加密證書(shū)

12、cryptography symbol ─── 密碼學(xué)符號

cryptography 相似詞語(yǔ)短語(yǔ)

1、cryptographic ─── adj.關(guān)于暗號的,用密碼寫(xiě)的

2、cystography ─── n.[特醫]膀胱造影術(shù)

3、cryptographer ─── n.譯解密碼者;擔任密碼者

4、chartography ─── n.制圖法(等于cartography)

5、cryptograph ─── n.密碼,密文;vt.把…譯成密碼

6、glyptography ─── 寶石雕刻術(shù)

7、cartography ─── n.地圖制作,制圖;制圖學(xué),繪圖法

8、cryptographist ─── n.使用密碼之人;密碼專(zhuān)家(等于cryptographer)

9、cryptographs ─── n.密碼,密文;vt.把…譯成密碼

cryptography 常見(jiàn)例句(雙語(yǔ)使用場(chǎng)景)

1、The SECG represents the first working group that is devoted exclusively to developing standards based on Elliptic Curve Cryptography (ECC). ─── SECG代表著(zhù)第一個(gè)專(zhuān)門(mén)開(kāi)發(fā)基于橢圓曲線(xiàn)加密技術(shù)(ECC)的標準的組織。

2、The following figure shows the sequence of encrypting with the supporting elements of public key cryptography. ─── 下圖顯示在具有公鑰加密的支持元素的情況下進(jìn)行加密的順序。

3、Sequences with good pseudorandom properties and large linear span are widely used in the CDMA spread spectrum communication and cryptography. ─── 具有優(yōu)良偽隨機特性和較大線(xiàn)性復雜度的偽隨機序列廣泛應用于CDMA擴頻通信和密碼學(xué)中。

4、As with other forms of cryptography, it is not distributed with the kernel by default due to export restrictions. ─── 和其它的加密形式一樣,由于出口的限制,默認情況下,是不和內核一同發(fā)布的.

5、Making use of the good properties of cryptography Hash functions and the difficulties of DLP,a verifiable and linkable ring signature scheme is constructed. ─── 利用密碼哈希函數的良好性質(zhì)和DLP的困難性問(wèn)題,構造了一個(gè)可驗證可關(guān)聯(lián)的環(huán)簽名方案。

6、The following figure shows the sequence of verifying with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行驗證的順序。

7、Such a photon counter is essential if quantum cryptography is to work, because it will allow what are known as quantum repeaters to be built. ─── 假如要讓量子密碼學(xué)學(xué)以致用,這樣的光子計算器至關(guān)重要,因為后者為量子中繼器的建立提供支持。

8、As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future. ─── 作為密碼學(xué)的應用領(lǐng)域,不可逆算法以及硬件加密技術(shù)也將是今后必不可少的技術(shù)輔助。

9、Based on ID-based cryptography system,a new registration protocol is proposed. ─── 在基于身份公鑰系統的基礎上,給出新的注冊協(xié)議。

10、Cryptography is a huge field, but only one facet of software security. ─── 密碼學(xué)是一個(gè)巨大的領(lǐng)域,但又只是軟體安全性的一個(gè)方面。

11、Defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest. ─── 定義加加密算法是對稱(chēng)的、非對稱(chēng)的還是消息摘要。

12、This paper introduces the basic content of network communications. It also discusses cryptography, user authentication, firewall etc. ─── 介紹了網(wǎng)絡(luò )安全的基本內容,簡(jiǎn)述了加密技術(shù)、份認證技術(shù)、火墻技術(shù)等基本的信息安全技術(shù)。

13、In cryptography, an encrypted message. ─── 密碼學(xué)中一種加過(guò)密的報文,同cipher text。

14、Unlike cryptography, which allows data to be encrypted and then decrypted, hashing data is a one-way process. ─── 與加密不同,加密允許數據加密后再解密,而哈希數據只允許單向進(jìn)行。

15、Smolin and Gilles Brassard cast caution aside and undertook a groundbreaking experiment that would demonstrate a new cryptography based on the principles of quantum mechanics. ─── 他們根據量子力學(xué)的原理,展示了一種新的密碼技術(shù)。

16、It supports a large number of cryptography algorithms and provides an implementation for JCE 1.2.1. ─── 它支持大量的密碼術(shù)算法,并提供JCE 1.2.1的實(shí)現。

17、The following figure shows the sequence of decrypting with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行解密的順序。

18、The multi-scalar multiplication with two scalars is the most time consuming operations in elliptic curve cryptography(ECC). ─── 在現代密碼系統中使用橢圓曲線(xiàn)密碼(ECC)最頻繁的一種方法是多點(diǎn)乘算法。

19、In cryptography security, a method of applying additional security to a key utilizing the identities of both the originator, and also the ultimate recipient. ─── 在密碼安全學(xué)中,一種對密鑰施加額外保護的方法,它利用了編碼者與最終用戶(hù)的一致性。

20、Modular exponentiation of larger-number has universal application in cryptography,and it is the base operation in most public-key cryptography algorithms. ─── 大數模冪在密碼學(xué)領(lǐng)域有廣泛的應用,它是公鑰密碼的基礎。

21、The above list also provides examples of applications of formal languages. Other newer application areas are cryptography and computer graphics. ─── 以上所列的為形式語(yǔ)言的的一些應用。此外新的應用包括密碼學(xué)和計算機圖形學(xué)。

22、Public-key cryptography was born in 1976 with independent research by Ralph Merkle and by Whitfield Diffie and Martin Hellman. ─── 公開(kāi)密鑰密碼技術(shù)誕生于1976年,由Ralph Merkle和由Whitfield Diffie與Martin Hellman獨立研制而成。

23、PKI (Public Key Infrastructure), which is on the base of cryptography, resolved the issue of trust perfectly using public key certificate as a carrier. ─── PKI(Public Key Infrastructure,公鑰基礎設施)以密碼學(xué)為理論基礎,以公鑰證書(shū)為載體,較好地解決了網(wǎng)絡(luò )中的信任問(wèn)題。

24、Cool ideas in Applied Cryptography Bruce Schneier discusses plenty of cool things you can do with cryptography. ─── Bruce Schneier討論了許多您可以用密碼學(xué)來(lái)做的很酷的事情。

25、For example, many popular press articles deal with cryptography: what it is, and where, when, and how to use it. ─── 上。例如,許多流行的出版文章討論密碼學(xué):它是什么,以及何處、何時(shí)及如何使用它。

26、He is a co-author of the Handbook of Applied Cryptography and more recently, A Guide to Elliptic Curve Cryptography. ─── 他參與編撰了《Handbook of Applied Cryptography》,最近又參與編撰了《A Guide to Elliptic Curve Cryptography》。

27、The number that you choose to rotate your letters by is what we call in cryptography, a key. ─── 你選擇的旋轉字母的數量就是我們在密碼學(xué)中所說(shuō)的密匙。

28、Key pair In asymmetric cryptography, the public and private keys together. ─── 在非對稱(chēng)密碼術(shù)中,公鑰和私鑰組合在一起成為密鑰對。

29、In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and program checking. ─── 因在計算復雜性理論、應用密碼學(xué)和程序測試方面的貢獻而獲獎。

30、Bouncy Castle is an open source, lightweight cryptography package for the Java platform. ─── Bouncy Castle是一種用于Java平臺的開(kāi)放源碼的輕量級密碼術(shù)包。

31、In cryptography, a product cipher developed by IBM that formed the basis of DES. It used 128-bit data blocks and a 128-bit key. ─── 在密碼學(xué)中,由IBM公司開(kāi)發(fā)的一種乘積密碼,后成為DES的基礎,它使用128位數據塊和一個(gè)128位的密鑰。

32、The primary disadvantage of public key cryptography is speed. ─── 公共密鑰加密的主要缺點(diǎn)是速度。

33、At the same time,the key generator center creates partial private keys for nodes,and then solves the key escrow problem in the identity-based cryptography. ─── 同時(shí)密鑰生成中心為用戶(hù)生成部分私鑰,解決了基于身份密碼體制中的密鑰托管問(wèn)題;

34、This paper discusses the application of public key cryptography to the digital signature,especially to digital multisignatures. ─── 介紹了公開(kāi)鑰密碼體制在數字簽名中的應用,特別是集體簽名問(wèn)題。

35、In cryptography, an early example of monoalphabetic, or substitution cipher used in the Gallic wars. ─── 密碼學(xué)中,在高盧戰爭中使用的一種單表置換密碼,或稱(chēng)替代密碼的早期例子。

36、The following figure shows the sequence of signing and encrypting with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行簽名和加密的順序。

37、The following figure shows the sequence of signing with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行簽名的順序。

38、When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl. ─── 假如密碼算法是非法的話(huà),那么你就什么都看不懂了.

39、Dr. Vanstone is one of the leading experts in the field of Elliptic Curve Cryptography (ECC) research, having authored or co-authored over 250 publications on the topic. ─── Vanstone博士是橢圓曲線(xiàn)加密技術(shù)(ECC)研究領(lǐng)域的領(lǐng)導專(zhuān)家之一,曾針對該主題編撰或參與編撰250多篇論文。

40、To use public-key cryptography to digitally sign a message, Alice first applies a hash algorithm to the message to create a message digest. ─── 為了使用公鑰加密對消息進(jìn)行數字簽名,小紅首先將哈希算法應用于該消息以創(chuàng )建消息摘要。

41、The following figure shows the sequence of decrypting and verifying the digital signature with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下對數字簽名進(jìn)行解密和驗證的順序。

42、In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers. ─── 密碼學(xué)中,由替代密碼和置換密碼結合使用而構成的一種密碼。

43、Similar to many other advanced cryptography packages, the Bouncy Castle package uses type polymorphism extensively to separate general concepts from implementing algorithms. ─── 與許多其它高級密碼術(shù)包相似,Bouncy Castle包廣泛使用類(lèi)型多態(tài)性來(lái)將常規概念與實(shí)現算法分開(kāi)。

44、An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site. ─── Java密碼擴展系統的一個(gè)實(shí)現在Sun的網(wǎng)站中可以找到密碼服務(wù)提供者的目錄。

45、To solve the problems of information security and copyright protection, the technologies such as cryptography and digital signature, have been presented. ─── 基于私有或公共密鑰的加密技術(shù)可以用來(lái)控制數據訪(fǎng)問(wèn),它將明文消息變換成旁人無(wú)法理解的密文消息。

46、To protect individual and prevent from the consumer committing,Zhang and his partners proposed one-off public key using identity-based cryptography from bilinear pairings. ─── 為了保護用戶(hù)的隱私又可以避免犯罪,張等人利用基于身份的密碼系統,構造了一次性公鑰系統。

47、JCE is JCA (Java Cryptography Architecture), an extension. ─── JCE是JCA(Java Cryptography Architecture)的一種擴展。

48、This paper presents a kind of novel Lissajous chaotic stream ciphers based on the analysis of the random number in network security authentication cryptography. ─── 在網(wǎng)絡(luò )安全認證加密中的隨機數的基礎上,提出了一類(lèi)新型的李沙育混沌流密碼。

49、An Introduction To CryptographyChapter 1, "The Basics of Cryptography," provides an overview of theterminology and concepts you will encounter as you use PGP products. ─── Chapter 2, "Phil Zimmermann on PG (譯):介紹CryptographyChapter 1 , “基本加密, ”概述了theterminology和概念,將會(huì )遇到因為您使用的PGP products.

50、Be signed with a strong name using standard public key cryptography. ─── 使用標準公鑰密碼系統用強名稱(chēng)簽名。

51、RSA cryptography algorithm is an important algorithm, the procedure of the algorithm is a complete implementation process. ─── RSA算法是密碼學(xué)中一個(gè)重要算法,該程序給出了該算法的完整實(shí)現過(guò)程。

52、The field that encompasses both cryptography and cryptanalysis. ─── 包含加密技術(shù)和密碼分析(學(xué))兩部分的學(xué)科領(lǐng)域。

53、MD5(Message Digest) encryption algorithm is a one-way hash function in cryptography. ─── MD5(Message Digest信息摘要)是密碼學(xué)中的一種單向散列函數,它以512位的明文文本作為輸入,輸出恒為128位的散列值。

54、In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider. ─── 在這個(gè)演示中,我使用了SunJCE密碼術(shù)供應商的TripleDES塊加密算法。

55、Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt. ─── 因此,使用量子加密將選票信息從投票站送往計票中心,也有那么點(diǎn)形象工程的色彩。

56、In cryptography, the additional characters added to a plaintext message, to ensure that its length is an integral number of blocks for encryption by a block cipher. ─── 在密碼學(xué)中,為了使明文信息的長(cháng)度為分組密碼加密中所用的塊的整數倍,而在明文中添加的附加字符。

57、The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace. ─── name屬性可以是位于System.Security.Cryptography命名空間中的某個(gè)抽象類(lèi)的名稱(chēng)。

58、In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack. ─── 另外,量子保密可以新的方法保護信息,從而避免經(jīng)典攻擊下的信息竊取。

59、Crypto code for the Elliptic Curce Cryptography complete source code, has been tested. ─── (譯):加密代碼的完整的橢圓Curce加密源代碼,已經(jīng)過(guò)測試。

60、A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography. ─── PKI由支持公鑰密碼學(xué)應用的協(xié)議、服務(wù)和標準組成。

61、In this case, there's an antidote: cryptography, the use of codes and ciphers to protect information. ─── 在這種情況下,有一種解決辦法:密碼學(xué),用密碼保護信息。

62、In cryptography, we also need to discuss modular logarithm. ─── 在密碼學(xué)中,我們也需要討論模對數。

63、The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other. ─── SSL協(xié)議基于公鑰密碼,加密密鑰成對地出現在公鑰密碼中,它們是在數學(xué)上是相關(guān)的,但無(wú)法由一個(gè)推知另一個(gè)。

64、Cryptography helps provide accountability, fairness, accuracy, and confidentiality. ─── 密碼學(xué)使得加密保護,公平交易,問(wèn)責稱(chēng)為可能。

65、In studying symmetric key(secret key) cryptography system,the disadvantages of DES in secret-key management and security are analysed. ─── 在對稱(chēng)加密體制方面,重點(diǎn)討論了DES算法,給出了其在密鑰管理,安全應用方面存在的問(wèn)題;

66、Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect secrecy. ─── 因為一次插入被理論上證明是不被破譯的,量密碼術(shù)是完全保密的答案。

67、In symmetric cryptography systems, a single key that is used for both encryption and decryption. ─── 在對稱(chēng)密碼術(shù)系統中同時(shí)用于加密和解密的單個(gè)密鑰。

68、Cryptography helps protect data from being viewed or modified and helps provide a secure means of communication over otherwise insecure channels. ─── 加密可以幫助保護數據不被查看和修改,并且可以幫助在本不安全的信道上提供安全的通信方式。

69、For example, one could perform quantum cryptography with an entangled photon pair or an entangled pair of atomic nuclei or even a photon and a nucleus entangled together. ─── 例如,我們可以用一對纏結光子,也可以用一對纏結原子核,甚至是纏結在一起的一個(gè)光子與一個(gè)原子核,來(lái)執行量子密碼學(xué)的工作。

70、The protocol combines the symmetric with non-symmetric cryptography.Non-symmetric cryptography adopts Elliptic Curve Cryptosystem with greater security and shorter keys. ─── 協(xié)議將對稱(chēng)密碼體制和非對稱(chēng)密碼體制有機地結合起來(lái),非對稱(chēng)密碼體制采用密鑰比特少且安全性高的橢圓曲線(xiàn)密碼體制。

71、Namespace contains classes that allow you to perform both symmetric and asymmetric cryptography, create hashes, and provide random number generation. ─── 命名空間包含一些類(lèi),通過(guò)這些類(lèi)您可以執行對稱(chēng)和不對稱(chēng)加密,創(chuàng )建哈希值和提供隨機數生成。

72、Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe. ─── 量子密碼被證明是絕對安全的,其核心技術(shù)是量子密鑰分配(QKD)。

73、Paul Kocher, Cryptography Research's president and chief scientist, thinks HD DVD's decision not to adopt his technology eventually tipped the battle to Blu-ray. ─── Paul Kocher(Cryptography Research的總裁和首席科學(xué)家)認為hd DVD決定不采用他的技術(shù)最終使戰局變得對Blu-ray有利。

74、There's cryptography going on. ─── 這里就使用了密碼技術(shù)。

75、William Stallings,Cryptography and Network Security(4/e), Prentice Hall, ISBN:0131873164. ─── 信息安全觀(guān)念:黃景彰,信息安全--電子商務(wù)之基礎,華泰書(shū)局,ISBN:9576093384。

76、Method or the name of an abstract cryptography class in the. ─── 命名空間中的抽象加密類(lèi)的名稱(chēng)。

77、ECC is a new field in cryptography, this crypt system has many advantages of fast speed and high security. ─── 基于橢圓曲線(xiàn)的公鑰密碼體制是密碼學(xué)研究的一個(gè)新課題,這種密碼體制具有速度快、全性高的優(yōu)點(diǎn)。

78、The transport-layer security standard overcomes the inefficiencies associated with public-key cryptography. ─── 傳輸層安全性標準解決了與公共密鑰加密技術(shù)關(guān)聯(lián)的效率低下問(wèn)題。

79、Recommend cryptography foundation with prove secret key and disclose distribution skill of key. 3. ─── 3.詳述如何將密碼學(xué)應用到資訊安全的相關(guān)技術(shù)。

80、Quantum cryptography,which is based on fundamental physical principles,has been proved to be an effective technique fo r secure key distribution. ─── 基于量子物理原理的量子密碼術(shù)已被證明是保密信中密鑰安全分配的有效手段。

81、The company went through several ideas, including cryptography software and a service for transmitting money via PDAs, before finding its niche as a web-based payment system. ─── 再成為網(wǎng)上支付系統之前,公司很不少的發(fā)展方向,包括加密軟件,提供PDA轉帳服務(wù)等。

82、Finally, there was the issue of cryptography. ─── 最后就是加密問(wèn)題。

83、Author studies IBE technology, analyses the principle of the Ellipse Curve Cryptography(ECC) and its performance and efficiency. ─── 作者首先研究標識加密技術(shù)IBE,分析橢圓曲線(xiàn)密碼的實(shí)現原理、性能以及效率。

84、Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption. ─── 由于使用了不同的密匙進(jìn)行加密和解密消息,因此這種形式的加密被稱(chēng)為不對稱(chēng)加密。

85、The most important supporting concept for message security is public key cryptography. ─── 在郵件安全領(lǐng)域,最重要的支持性概念是公鑰加密。

86、Round these two respects, how to structure security elliptic curve cryptography and the implementations of ECC is first discussed in this paper. ─── 圍繞這兩個(gè)方面的問(wèn)題,本文首先討論了如何構造安全的橢圓曲線(xiàn)密碼體制和橢圓曲線(xiàn)密碼體制的應用;

87、Compared with ECC, the computing on conic curve is much easier, and the facility of plaintext embedding is the most exciting feature of conic curve cryptography. ─── 在圓錐曲線(xiàn)群上的各項計算比橢圓曲線(xiàn)群上的更簡(jiǎn)單,尤其是在其上的編碼和解碼都很容易被執行。

88、The quantum cryptography and BB84 protocol are introduced.Their security is analyzed.An example to explain the process of quantum transmission is given. ─── 介紹了量子加密以及BB84協(xié)議,對其安全性進(jìn)行了分析,并給出例子詳述量子密鑰的傳送過(guò)程。

89、Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based. ─── 這些技術(shù)并沒(méi)有打破量子密碼學(xué)的基礎理論。

版權聲明: 本站僅提供信息存儲空間服務(wù),旨在傳遞更多信息,不擁有所有權,不承擔相關(guān)法律責任,不代表本網(wǎng)贊同其觀(guān)點(diǎn)和對其真實(shí)性負責。如因作品內容、版權和其它問(wèn)題需要同本網(wǎng)聯(lián)系的,請發(fā)送郵件至 舉報,一經(jīng)查實(shí),本站將立刻刪除。

亚洲精品视频一区二区,一级毛片在线观看视频,久久国产a,狠狠狠色丁香婷婷综合久久五月,天天做天天欢摸夜夜摸狠狠摸