扒开老师双腿猛进入白浆小说,熟女人妻私密按摩内射,成人A片激情免费视频,亚洲欧洲AV无码区玉蒲区

當(dāng)前位置: > 投稿>正文

cryptography是什么意思,cryptography中文翻譯,cryptography怎么讀、發(fā)音、用法及例句

2025-09-15 投稿

?cryptography

cryptography 發(fā)音

英:[kr?p't?gr?f?]  美:[kr?p'tɑgr?fi]

英:  美:

cryptography 中文意思翻譯

常見釋義:

n.密碼學(xué);密碼使用法

cryptography 詞性/詞形變化,cryptography變形

副詞: cryptographically |形容詞: cryptographic |

cryptography 短語詞組

1、cryptography and network security pdf ─── 密碼學(xué)與網(wǎng)絡(luò)安全pdf

2、public key cryptography ─── [計(jì)] 公開鑰密碼

3、cryptography table ─── 加密表

4、number theory and cryptography ─── 數(shù)論與密碼學(xué)

5、computer cryptography ─── [計(jì)] 計(jì)算機(jī)密碼術(shù)

6、cryptography is often used ─── 密碼學(xué)經(jīng)常被使用

7、cryptography types ─── 加密類型

8、cryptography key ─── 密鑰

9、obfuscation cryptography ─── 模糊加密

10、cryptography meaning in english ─── 英語中的密碼學(xué)意義

11、cryptography certificate ─── 加密證書

12、cryptography symbol ─── 密碼學(xué)符號(hào)

cryptography 相似詞語短語

1、cryptographic ─── adj.關(guān)于暗號(hào)的,用密碼寫的

2、cystography ─── n.[特醫(yī)]膀胱造影術(shù)

3、cryptographer ─── n.譯解密碼者;擔(dān)任密碼者

4、chartography ─── n.制圖法(等于cartography)

5、cryptograph ─── n.密碼,密文;vt.把…譯成密碼

6、glyptography ─── 寶石雕刻術(shù)

7、cartography ─── n.地圖制作,制圖;制圖學(xué),繪圖法

8、cryptographist ─── n.使用密碼之人;密碼專家(等于cryptographer)

9、cryptographs ─── n.密碼,密文;vt.把…譯成密碼

cryptography 常見例句(雙語使用場(chǎng)景)

1、The SECG represents the first working group that is devoted exclusively to developing standards based on Elliptic Curve Cryptography (ECC). ─── SECG代表著第一個(gè)專門開發(fā)基于橢圓曲線加密技術(shù)(ECC)的標(biāo)準(zhǔn)的組織。

2、The following figure shows the sequence of encrypting with the supporting elements of public key cryptography. ─── 下圖顯示在具有公鑰加密的支持元素的情況下進(jìn)行加密的順序。

3、Sequences with good pseudorandom properties and large linear span are widely used in the CDMA spread spectrum communication and cryptography. ─── 具有優(yōu)良偽隨機(jī)特性和較大線性復(fù)雜度的偽隨機(jī)序列廣泛應(yīng)用于CDMA擴(kuò)頻通信和密碼學(xué)中。

4、As with other forms of cryptography, it is not distributed with the kernel by default due to export restrictions. ─── 和其它的加密形式一樣,由于出口的限制,默認(rèn)情況下,是不和內(nèi)核一同發(fā)布的.

5、Making use of the good properties of cryptography Hash functions and the difficulties of DLP,a verifiable and linkable ring signature scheme is constructed. ─── 利用密碼哈希函數(shù)的良好性質(zhì)和DLP的困難性問題,構(gòu)造了一個(gè)可驗(yàn)證可關(guān)聯(lián)的環(huán)簽名方案。

6、The following figure shows the sequence of verifying with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行驗(yàn)證的順序。

7、Such a photon counter is essential if quantum cryptography is to work, because it will allow what are known as quantum repeaters to be built. ─── 假如要讓量子密碼學(xué)學(xué)以致用,這樣的光子計(jì)算器至關(guān)重要,因?yàn)楹笳邽榱孔又欣^器的建立提供支持。

8、As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future. ─── 作為密碼學(xué)的應(yīng)用領(lǐng)域,不可逆算法以及硬件加密技術(shù)也將是今后必不可少的技術(shù)輔助。

9、Based on ID-based cryptography system,a new registration protocol is proposed. ─── 在基于身份公鑰系統(tǒng)的基礎(chǔ)上,給出新的注冊(cè)協(xié)議。

10、Cryptography is a huge field, but only one facet of software security. ─── 密碼學(xué)是一個(gè)巨大的領(lǐng)域,但又只是軟體安全性的一個(gè)方面。

11、Defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest. ─── 定義加加密算法是對(duì)稱的、非對(duì)稱的還是消息摘要。

12、This paper introduces the basic content of network communications. It also discusses cryptography, user authentication, firewall etc. ─── 介紹了網(wǎng)絡(luò)安全的基本內(nèi)容,簡述了加密技術(shù)、份認(rèn)證技術(shù)、火墻技術(shù)等基本的信息安全技術(shù)。

13、In cryptography, an encrypted message. ─── 密碼學(xué)中一種加過密的報(bào)文,同cipher text。

14、Unlike cryptography, which allows data to be encrypted and then decrypted, hashing data is a one-way process. ─── 與加密不同,加密允許數(shù)據(jù)加密后再解密,而哈希數(shù)據(jù)只允許單向進(jìn)行。

15、Smolin and Gilles Brassard cast caution aside and undertook a groundbreaking experiment that would demonstrate a new cryptography based on the principles of quantum mechanics. ─── 他們根據(jù)量子力學(xué)的原理,展示了一種新的密碼技術(shù)。

16、It supports a large number of cryptography algorithms and provides an implementation for JCE 1.2.1. ─── 它支持大量的密碼術(shù)算法,并提供JCE 1.2.1的實(shí)現(xiàn)。

17、The following figure shows the sequence of decrypting with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行解密的順序。

18、The multi-scalar multiplication with two scalars is the most time consuming operations in elliptic curve cryptography(ECC). ─── 在現(xiàn)代密碼系統(tǒng)中使用橢圓曲線密碼(ECC)最頻繁的一種方法是多點(diǎn)乘算法。

19、In cryptography security, a method of applying additional security to a key utilizing the identities of both the originator, and also the ultimate recipient. ─── 在密碼安全學(xué)中,一種對(duì)密鑰施加額外保護(hù)的方法,它利用了編碼者與最終用戶的一致性。

20、Modular exponentiation of larger-number has universal application in cryptography,and it is the base operation in most public-key cryptography algorithms. ─── 大數(shù)模冪在密碼學(xué)領(lǐng)域有廣泛的應(yīng)用,它是公鑰密碼的基礎(chǔ)。

21、The above list also provides examples of applications of formal languages. Other newer application areas are cryptography and computer graphics. ─── 以上所列的為形式語言的的一些應(yīng)用。此外新的應(yīng)用包括密碼學(xué)和計(jì)算機(jī)圖形學(xué)。

22、Public-key cryptography was born in 1976 with independent research by Ralph Merkle and by Whitfield Diffie and Martin Hellman. ─── 公開密鑰密碼技術(shù)誕生于1976年,由Ralph Merkle和由Whitfield Diffie與Martin Hellman獨(dú)立研制而成。

23、PKI (Public Key Infrastructure), which is on the base of cryptography, resolved the issue of trust perfectly using public key certificate as a carrier. ─── PKI(Public Key Infrastructure,公鑰基礎(chǔ)設(shè)施)以密碼學(xué)為理論基礎(chǔ),以公鑰證書為載體,較好地解決了網(wǎng)絡(luò)中的信任問題。

24、Cool ideas in Applied Cryptography Bruce Schneier discusses plenty of cool things you can do with cryptography. ─── Bruce Schneier討論了許多您可以用密碼學(xué)來做的很酷的事情。

25、For example, many popular press articles deal with cryptography: what it is, and where, when, and how to use it. ─── 上。例如,許多流行的出版文章討論密碼學(xué):它是什么,以及何處、何時(shí)及如何使用它。

26、He is a co-author of the Handbook of Applied Cryptography and more recently, A Guide to Elliptic Curve Cryptography. ─── 他參與編撰了《Handbook of Applied Cryptography》,最近又參與編撰了《A Guide to Elliptic Curve Cryptography》。

27、The number that you choose to rotate your letters by is what we call in cryptography, a key. ─── 你選擇的旋轉(zhuǎn)字母的數(shù)量就是我們?cè)诿艽a學(xué)中所說的密匙。

28、Key pair In asymmetric cryptography, the public and private keys together. ─── 在非對(duì)稱密碼術(shù)中,公鑰和私鑰組合在一起成為密鑰對(duì)。

29、In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and program checking. ─── 因在計(jì)算復(fù)雜性理論、應(yīng)用密碼學(xué)和程序測(cè)試方面的貢獻(xiàn)而獲獎(jiǎng)。

30、Bouncy Castle is an open source, lightweight cryptography package for the Java platform. ─── Bouncy Castle是一種用于Java平臺(tái)的開放源碼的輕量級(jí)密碼術(shù)包。

31、In cryptography, a product cipher developed by IBM that formed the basis of DES. It used 128-bit data blocks and a 128-bit key. ─── 在密碼學(xué)中,由IBM公司開發(fā)的一種乘積密碼,后成為DES的基礎(chǔ),它使用128位數(shù)據(jù)塊和一個(gè)128位的密鑰。

32、The primary disadvantage of public key cryptography is speed. ─── 公共密鑰加密的主要缺點(diǎn)是速度。

33、At the same time,the key generator center creates partial private keys for nodes,and then solves the key escrow problem in the identity-based cryptography. ─── 同時(shí)密鑰生成中心為用戶生成部分私鑰,解決了基于身份密碼體制中的密鑰托管問題;

34、This paper discusses the application of public key cryptography to the digital signature,especially to digital multisignatures. ─── 介紹了公開鑰密碼體制在數(shù)字簽名中的應(yīng)用,特別是集體簽名問題。

35、In cryptography, an early example of monoalphabetic, or substitution cipher used in the Gallic wars. ─── 密碼學(xué)中,在高盧戰(zhàn)爭中使用的一種單表置換密碼,或稱替代密碼的早期例子。

36、The following figure shows the sequence of signing and encrypting with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行簽名和加密的順序。

37、The following figure shows the sequence of signing with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下進(jìn)行簽名的順序。

38、When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl. ─── 假如密碼算法是非法的話,那么你就什么都看不懂了.

39、Dr. Vanstone is one of the leading experts in the field of Elliptic Curve Cryptography (ECC) research, having authored or co-authored over 250 publications on the topic. ─── Vanstone博士是橢圓曲線加密技術(shù)(ECC)研究領(lǐng)域的領(lǐng)導(dǎo)專家之一,曾針對(duì)該主題編撰或參與編撰250多篇論文。

40、To use public-key cryptography to digitally sign a message, Alice first applies a hash algorithm to the message to create a message digest. ─── 為了使用公鑰加密對(duì)消息進(jìn)行數(shù)字簽名,小紅首先將哈希算法應(yīng)用于該消息以創(chuàng)建消息摘要。

41、The following figure shows the sequence of decrypting and verifying the digital signature with the addition of the supporting elements of public key cryptography. ─── 下圖顯示在添加了公鑰加密的支持元素的情況下對(duì)數(shù)字簽名進(jìn)行解密和驗(yàn)證的順序。

42、In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers. ─── 密碼學(xué)中,由替代密碼和置換密碼結(jié)合使用而構(gòu)成的一種密碼。

43、Similar to many other advanced cryptography packages, the Bouncy Castle package uses type polymorphism extensively to separate general concepts from implementing algorithms. ─── 與許多其它高級(jí)密碼術(shù)包相似,Bouncy Castle包廣泛使用類型多態(tài)性來將常規(guī)概念與實(shí)現(xiàn)算法分開。

44、An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site. ─── Java密碼擴(kuò)展系統(tǒng)的一個(gè)實(shí)現(xiàn)在Sun的網(wǎng)站中可以找到密碼服務(wù)提供者的目錄。

45、To solve the problems of information security and copyright protection, the technologies such as cryptography and digital signature, have been presented. ─── 基于私有或公共密鑰的加密技術(shù)可以用來控制數(shù)據(jù)訪問,它將明文消息變換成旁人無法理解的密文消息。

46、To protect individual and prevent from the consumer committing,Zhang and his partners proposed one-off public key using identity-based cryptography from bilinear pairings. ─── 為了保護(hù)用戶的隱私又可以避免犯罪,張等人利用基于身份的密碼系統(tǒng),構(gòu)造了一次性公鑰系統(tǒng)。

47、JCE is JCA (Java Cryptography Architecture), an extension. ─── JCE是JCA(Java Cryptography Architecture)的一種擴(kuò)展。

48、This paper presents a kind of novel Lissajous chaotic stream ciphers based on the analysis of the random number in network security authentication cryptography. ─── 在網(wǎng)絡(luò)安全認(rèn)證加密中的隨機(jī)數(shù)的基礎(chǔ)上,提出了一類新型的李沙育混沌流密碼。

49、An Introduction To CryptographyChapter 1, "The Basics of Cryptography," provides an overview of theterminology and concepts you will encounter as you use PGP products. ─── Chapter 2, "Phil Zimmermann on PG (譯):介紹CryptographyChapter 1 , “基本加密, ”概述了theterminology和概念,將會(huì)遇到因?yàn)槟褂玫腜GP products.

50、Be signed with a strong name using standard public key cryptography. ─── 使用標(biāo)準(zhǔn)公鑰密碼系統(tǒng)用強(qiáng)名稱簽名。

51、RSA cryptography algorithm is an important algorithm, the procedure of the algorithm is a complete implementation process. ─── RSA算法是密碼學(xué)中一個(gè)重要算法,該程序給出了該算法的完整實(shí)現(xiàn)過程。

52、The field that encompasses both cryptography and cryptanalysis. ─── 包含加密技術(shù)和密碼分析(學(xué))兩部分的學(xué)科領(lǐng)域。

53、MD5(Message Digest) encryption algorithm is a one-way hash function in cryptography. ─── MD5(Message Digest信息摘要)是密碼學(xué)中的一種單向散列函數(shù),它以512位的明文文本作為輸入,輸出恒為128位的散列值。

54、In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider. ─── 在這個(gè)演示中,我使用了SunJCE密碼術(shù)供應(yīng)商的TripleDES塊加密算法。

55、Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt. ─── 因此,使用量子加密將選票信息從投票站送往計(jì)票中心,也有那么點(diǎn)形象工程的色彩。

56、In cryptography, the additional characters added to a plaintext message, to ensure that its length is an integral number of blocks for encryption by a block cipher. ─── 在密碼學(xué)中,為了使明文信息的長度為分組密碼加密中所用的塊的整數(shù)倍,而在明文中添加的附加字符。

57、The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace. ─── name屬性可以是位于System.Security.Cryptography命名空間中的某個(gè)抽象類的名稱。

58、In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack. ─── 另外,量子保密可以新的方法保護(hù)信息,從而避免經(jīng)典攻擊下的信息竊取。

59、Crypto code for the Elliptic Curce Cryptography complete source code, has been tested. ─── (譯):加密代碼的完整的橢圓Curce加密源代碼,已經(jīng)過測(cè)試。

60、A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography. ─── PKI由支持公鑰密碼學(xué)應(yīng)用的協(xié)議、服務(wù)和標(biāo)準(zhǔn)組成。

61、In this case, there's an antidote: cryptography, the use of codes and ciphers to protect information. ─── 在這種情況下,有一種解決辦法:密碼學(xué),用密碼保護(hù)信息。

62、In cryptography, we also need to discuss modular logarithm. ─── 在密碼學(xué)中,我們也需要討論模對(duì)數(shù)。

63、The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other. ─── SSL協(xié)議基于公鑰密碼,加密密鑰成對(duì)地出現(xiàn)在公鑰密碼中,它們是在數(shù)學(xué)上是相關(guān)的,但無法由一個(gè)推知另一個(gè)。

64、Cryptography helps provide accountability, fairness, accuracy, and confidentiality. ─── 密碼學(xué)使得加密保護(hù),公平交易,問責(zé)稱為可能。

65、In studying symmetric key(secret key) cryptography system,the disadvantages of DES in secret-key management and security are analysed. ─── 在對(duì)稱加密體制方面,重點(diǎn)討論了DES算法,給出了其在密鑰管理,安全應(yīng)用方面存在的問題;

66、Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect secrecy. ─── 因?yàn)橐淮尾迦氡焕碚撋献C明是不被破譯的,量密碼術(shù)是完全保密的答案。

67、In symmetric cryptography systems, a single key that is used for both encryption and decryption. ─── 在對(duì)稱密碼術(shù)系統(tǒng)中同時(shí)用于加密和解密的單個(gè)密鑰。

68、Cryptography helps protect data from being viewed or modified and helps provide a secure means of communication over otherwise insecure channels. ─── 加密可以幫助保護(hù)數(shù)據(jù)不被查看和修改,并且可以幫助在本不安全的信道上提供安全的通信方式。

69、For example, one could perform quantum cryptography with an entangled photon pair or an entangled pair of atomic nuclei or even a photon and a nucleus entangled together. ─── 例如,我們可以用一對(duì)纏結(jié)光子,也可以用一對(duì)纏結(jié)原子核,甚至是纏結(jié)在一起的一個(gè)光子與一個(gè)原子核,來執(zhí)行量子密碼學(xué)的工作。

70、The protocol combines the symmetric with non-symmetric cryptography.Non-symmetric cryptography adopts Elliptic Curve Cryptosystem with greater security and shorter keys. ─── 協(xié)議將對(duì)稱密碼體制和非對(duì)稱密碼體制有機(jī)地結(jié)合起來,非對(duì)稱密碼體制采用密鑰比特少且安全性高的橢圓曲線密碼體制。

71、Namespace contains classes that allow you to perform both symmetric and asymmetric cryptography, create hashes, and provide random number generation. ─── 命名空間包含一些類,通過這些類您可以執(zhí)行對(duì)稱和不對(duì)稱加密,創(chuàng)建哈希值和提供隨機(jī)數(shù)生成。

72、Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe. ─── 量子密碼被證明是絕對(duì)安全的,其核心技術(shù)是量子密鑰分配(QKD)。

73、Paul Kocher, Cryptography Research's president and chief scientist, thinks HD DVD's decision not to adopt his technology eventually tipped the battle to Blu-ray. ─── Paul Kocher(Cryptography Research的總裁和首席科學(xué)家)認(rèn)為hd DVD決定不采用他的技術(shù)最終使戰(zhàn)局變得對(duì)Blu-ray有利。

74、There's cryptography going on. ─── 這里就使用了密碼技術(shù)。

75、William Stallings,Cryptography and Network Security(4/e), Prentice Hall, ISBN:0131873164. ─── 信息安全觀念:黃景彰,信息安全--電子商務(wù)之基礎(chǔ),華泰書局,ISBN:9576093384。

76、Method or the name of an abstract cryptography class in the. ─── 命名空間中的抽象加密類的名稱。

77、ECC is a new field in cryptography, this crypt system has many advantages of fast speed and high security. ─── 基于橢圓曲線的公鑰密碼體制是密碼學(xué)研究的一個(gè)新課題,這種密碼體制具有速度快、全性高的優(yōu)點(diǎn)。

78、The transport-layer security standard overcomes the inefficiencies associated with public-key cryptography. ─── 傳輸層安全性標(biāo)準(zhǔn)解決了與公共密鑰加密技術(shù)關(guān)聯(lián)的效率低下問題。

79、Recommend cryptography foundation with prove secret key and disclose distribution skill of key. 3. ─── 3.詳述如何將密碼學(xué)應(yīng)用到資訊安全的相關(guān)技術(shù)。

80、Quantum cryptography,which is based on fundamental physical principles,has been proved to be an effective technique fo r secure key distribution. ─── 基于量子物理原理的量子密碼術(shù)已被證明是保密信中密鑰安全分配的有效手段。

81、The company went through several ideas, including cryptography software and a service for transmitting money via PDAs, before finding its niche as a web-based payment system. ─── 再成為網(wǎng)上支付系統(tǒng)之前,公司很不少的發(fā)展方向,包括加密軟件,提供PDA轉(zhuǎn)帳服務(wù)等。

82、Finally, there was the issue of cryptography. ─── 最后就是加密問題。

83、Author studies IBE technology, analyses the principle of the Ellipse Curve Cryptography(ECC) and its performance and efficiency. ─── 作者首先研究標(biāo)識(shí)加密技術(shù)IBE,分析橢圓曲線密碼的實(shí)現(xiàn)原理、性能以及效率。

84、Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption. ─── 由于使用了不同的密匙進(jìn)行加密和解密消息,因此這種形式的加密被稱為不對(duì)稱加密。

85、The most important supporting concept for message security is public key cryptography. ─── 在郵件安全領(lǐng)域,最重要的支持性概念是公鑰加密。

86、Round these two respects, how to structure security elliptic curve cryptography and the implementations of ECC is first discussed in this paper. ─── 圍繞這兩個(gè)方面的問題,本文首先討論了如何構(gòu)造安全的橢圓曲線密碼體制和橢圓曲線密碼體制的應(yīng)用;

87、Compared with ECC, the computing on conic curve is much easier, and the facility of plaintext embedding is the most exciting feature of conic curve cryptography. ─── 在圓錐曲線群上的各項(xiàng)計(jì)算比橢圓曲線群上的更簡單,尤其是在其上的編碼和解碼都很容易被執(zhí)行。

88、The quantum cryptography and BB84 protocol are introduced.Their security is analyzed.An example to explain the process of quantum transmission is given. ─── 介紹了量子加密以及BB84協(xié)議,對(duì)其安全性進(jìn)行了分析,并給出例子詳述量子密鑰的傳送過程。

89、Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based. ─── 這些技術(shù)并沒有打破量子密碼學(xué)的基礎(chǔ)理論。

本站其他內(nèi)容推薦

版權(quán)聲明: 本站僅提供信息存儲(chǔ)空間服務(wù),旨在傳遞更多信息,不擁有所有權(quán),不承擔(dān)相關(guān)法律責(zé)任,不代表本網(wǎng)贊同其觀點(diǎn)和對(duì)其真實(shí)性負(fù)責(zé)。如因作品內(nèi)容、版權(quán)和其它問題需要同本網(wǎng)聯(lián)系的,請(qǐng)發(fā)送郵件至 舉報(bào),一經(jīng)查實(shí),本站將立刻刪除。