ciphertext造句
- 1. Output: in the edit box ciphertext.
- 输出:在编辑框中显示密文。
youdao
- 2. The program will then calculate and display the ciphertext.
- 该程序将然后计算并显示密文。
youdao
- 3. This will clear the form of a string of figures ciphertext.
- 这样将明文变成形式为一串数字密文。
youdao
- 4. How ciphertext was generated in card reader using DUKPT encryption?
- 如何在读卡器使用dukpt密文加密生成的?
youdao
- 5. Note that there is also a method called ciphertext stealing for CBC.
- 请注意,CBC还有一种称为密文窃取的方法。
youdao
- 6. The following is a notation for relating plaintext, ciphertext, and keys.
- 下面是有关明文、密文和密钥关系的表示法。
youdao
- 7. Using a file input and output ciphertext expressly to carry out the test.
- 用的是文件输入输出明文密文,进行了测试。
youdao
- 8. The scheme has adaptively chosen ciphertext security in the random oracle model.
- 并在随机谕示模型下,证明了方案具有选择密文安全性。
youdao
- 9. The size of the ciphertext was a constant and independent of the size of the ring.
- 密文的大小是一个常量,并且与环的大小无关。
youdao
- 10. Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.
- 提出两个抗选择密文攻击的门限密码系统。
youdao
- 11. If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.
- 如果相同的块加密两次使用相同的密钥,由此产生的密文块是相同的。
youdao
- 12. In the random oracle model, the scheme is provably secure against adaptive chosen ciphertext attacks.
- 在随机预言模型下,该方案在适应性选择密文攻击下是可证明安全的。
youdao
- 13. The receiving application then decrypts the message upon receipt, converting from ciphertext back to plain text.
- 接着,接收应用程序一接收到消息就对其解密,将它从密文转换回明文。
youdao
- 14. According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.
- 根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。
youdao
- 15. Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.
- 由于敏感数据被加密,任何直接对数据库文件进行分析的攻击方式,都只能看到密文。
youdao
- 16. This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.
- 该方案被认为是抗适应性选择密文攻击的实用方案之一,但缺乏严格的安全性证明。
youdao
- 17. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
- 如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。
youdao
- 18. Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.
- 在高密度随机背包困难性假设下,可以证明方案在唯密文攻击下是安全的。
youdao
- 19. Function could potentially contain any binary character, it is possible to return a ciphertext containing a system delimiter where one did not previously exist.
- 函数返回的字符串可能包含二进制字符,所以可能返回包含系统定界字符的密文,而这个定界字符之前是不存在的。
youdao
- 20. Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.
- 针对数据库中数据的保密性问题,分析了目前已有的一些加密机制,提出了一种基于密文索引的新的查询方法。
youdao
- 21. The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.
- 差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。
youdao
- 22. Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.
- 现代加密算法必须更为复杂,因为密码文本常用户保护价值数十万或数百万美元计的信息。
youdao
- 23. In order to enable query on ciphertext, date and numeric typed data must be transformed according some rules, and the grouping cipher arithmetic must be changed a little.
- 为了保证密文数据在不解密的情况下能够被检索出来,日期、数字类型的数据需要按照一定的规则转换成字符,并且加密使用的分组密码算法需要进行一些改造。
youdao
- 24. In order to enable query on ciphertext, date and numeric typed data must be transformed according some rules, and the grouping cipher arithmetic must be changed a little.
- 为了保证密文数据在不解密的情况下能够被检索出来,日期、数字类型的数据需要按照一定的规则转换成字符,并且加密使用的分组密码算法需要进行一些改造。
youdao