去查网 logo

cryptography造句

1. The number that you choose to rotate your letters by is what we call in cryptography, a key.
你选择的旋转字母的数量就是我们在密码学中所说的密匙。

youdao

2. There's cryptography going on.
这里就使用了密码技术。

youdao

3. Finally, there was the issue of cryptography.
最后就是加密问题。

youdao

4. Well, we'll talk before long about cryptography.
好,我们等下讲讲密码学。

youdao

5. Appendix 4: Public-key cryptography terminology.
附录4:公钥加密术语。

youdao

6. Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。

youdao

7. Computing: Quantum cryptography is unbreakable in theory.
计算:量子密码理论上是无法破解的。

youdao

8. RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。

youdao

9. Note: See Resources for more information about cryptography in OpenBSD.
注意:有关OpenBSD中加密方面的更多信息,请参见参考资料部分。

youdao

10. All the clever cryptography means BitCoin dealings are difficult to trace.
所有聪明的密码学家都表示跟踪比特币交易很困难。

youdao

11. The articles on cryptography do contain a great deal of mathematical depth.
关于加密算法的文章确实包含了很多高深数学逻辑。

youdao

12. If you're familiar with data cryptography and SSL, you can skip this section.
如果您熟悉数据加密和SSL的知识,就可以跳过本节。

youdao

13. Cryptography is the art of "secret writing," as the word's Greek roots attest.
作为希腊的词根资产,加密技术是一种“神秘编写”艺术。

youdao

14. Since a pair of keys is involved, it is also called an asymmetric cryptography.
因为涉及到一对密钥,所以它也称为非对称加密。

youdao

15. This is the primary differentiating factor amongst the cryptography algorithms.
这是区分加密算法的根本。

youdao

16. Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。

youdao

17. There are also control challenges here, including those related to cryptography use.
这里还有一些控制上的问题,其中一些与应用加密有关。

youdao

18. To request a certificate, you need to generate a keypair using cryptography software.
要请求证书,您需要使用加密软件生成一个密钥对。

youdao

19. A digital certificate is more than just a cryptography key; it is an online credential.
数字证书不仅仅是一个加密密钥,它还是一个在线凭证。

youdao

20. You can use Shiro's cryptography support anywhere, even if a Subject is not being used.
你可以在任何地方使用Shiro的加密支持,甚至在不使用Subject的情况下。

youdao

21. Shiro’s goal in cryptography is to simplify and make usable the JDK’s cryptography support.
在加密方面,Shiro的目标是简化并让JDK的加密支持可用。

youdao

22. Cryptography is the process of hiding or obfuscating data so prying eyes can't understand it.
加密是隐藏或混淆数据以避免被偷窥的过程。

youdao

23. And their fears are not groundless: More than 90% of proprietary cryptography has been broken.
他们的害怕并非没有根据:90%以上的专用密码术都已被攻破。

youdao

24. This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。

youdao

25. Secret key cryptography is one of the most important technologies in distributed systems security.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。

youdao

26. Kerberos was designed based on secret key cryptography and using trusted third party authentication.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。

youdao

27. However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。

youdao

28. Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.
算法类型定义加加密算法是对称的、非对称的还是消息摘要。

youdao

29. In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider.
在这个演示中,我使用了SunJCE密码术供应商的tripledes块加密算法。

youdao

30. In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider.
在这个演示中,我使用了SunJCE密码术供应商的tripledes块加密算法。

youdao

按拼音查造句

全部查询工具

关于我们免责声明联系我们网站地图最近更新

免责说明:本站为非营利性网站,本站内容全部由《去查网》从互联网搜集编辑整理而成,版权归原作者所有,如有冒犯,请联系我们删除。

Copyright © 2020 - 2024 quchaw.com All rights reserved.浙ICP备20019715号