去查网 logo

ciphertext造句

1. Output: in the edit box ciphertext.
输出:在编辑框中显示密文。

youdao

2. The program will then calculate and display the ciphertext.
该程序将然后计算并显示密文。

youdao

3. This will clear the form of a string of figures ciphertext.
这样将明文变成形式为一串数字密文。

youdao

4. How ciphertext was generated in card reader using DUKPT encryption?
如何在读卡器使用dukpt密文加密生成的?

youdao

5. Note that there is also a method called ciphertext stealing for CBC.
请注意,CBC还有一种称为密文窃取的方法。

youdao

6. The following is a notation for relating plaintext, ciphertext, and keys.
下面是有关明文、密文和密钥关系的表示法。

youdao

7. Using a file input and output ciphertext expressly to carry out the test.
用的是文件输入输出明文密文,进行了测试。

youdao

8. The scheme has adaptively chosen ciphertext security in the random oracle model.
并在随机谕示模型下,证明了方案具有选择密文安全性。

youdao

9. The size of the ciphertext was a constant and independent of the size of the ring.
密文的大小是一个常量,并且与环的大小无关。

youdao

10. Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.
提出两个抗选择密文攻击的门限密码系统。

youdao

11. If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.
如果相同的块加密两次使用相同的密钥,由此产生的密文块是相同的。

youdao

12. In the random oracle model, the scheme is provably secure against adaptive chosen ciphertext attacks.
在随机预言模型下,该方案在适应性选择密文攻击下是可证明安全的。

youdao

13. The receiving application then decrypts the message upon receipt, converting from ciphertext back to plain text.
接着,接收应用程序一接收到消息就对其解密,将它从密文转换回明文。

youdao

14. According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.
根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。

youdao

15. Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.
由于敏感数据被加密,任何直接对数据库文件进行分析的攻击方式,都只能看到密文。

youdao

16. This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.
该方案被认为是抗适应性选择密文攻击的实用方案之一,但缺乏严格的安全性证明。

youdao

17. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。

youdao

18. Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.
在高密度随机背包困难性假设下,可以证明方案在唯密文攻击下是安全的。

youdao

19. Function could potentially contain any binary character, it is possible to return a ciphertext containing a system delimiter where one did not previously exist.
函数返回的字符串可能包含二进制字符,所以可能返回包含系统定界字符的密文,而这个定界字符之前是不存在的。

youdao

20. Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.
针对数据库中数据的保密性问题,分析了目前已有的一些加密机制,提出了一种基于密文索引的新的查询方法。

youdao

21. The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.
差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。

youdao

22. Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.
现代加密算法必须更为复杂,因为密码文本常用户保护价值数十万或数百万美元计的信息。

youdao

23. In order to enable query on ciphertext, date and numeric typed data must be transformed according some rules, and the grouping cipher arithmetic must be changed a little.
为了保证密文数据在不解密的情况下能够被检索出来,日期、数字类型的数据需要按照一定的规则转换成字符,并且加密使用的分组密码算法需要进行一些改造。

youdao

24. In order to enable query on ciphertext, date and numeric typed data must be transformed according some rules, and the grouping cipher arithmetic must be changed a little.
为了保证密文数据在不解密的情况下能够被检索出来,日期、数字类型的数据需要按照一定的规则转换成字符,并且加密使用的分组密码算法需要进行一些改造。

youdao

按拼音查造句

全部查询工具

关于我们免责声明联系我们网站地图最近更新

免责说明:本站为非营利性网站,本站内容全部由《去查网》从互联网搜集编辑整理而成,版权归原作者所有,如有冒犯,请联系我们删除。

Copyright © 2020 - 2024 quchaw.com All rights reserved.浙ICP备20019715号