The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度
取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度
取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫队抬着他来主持更生仪式。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密
。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
传统的对称性加密与公开密钥
法结合起来,兼备了
者的优
。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统
络体系结构(sna)产品中,对
要在某个

使用的操作键标进行加密的一种键(也称键标,也就是密钥)。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的
络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础
采用一定的加密、正交化
法,生成了三维反向喷流流场分区对接结构
格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特
,用于票据、证件、物品
,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础
,选择特定重要的信息,进行加密和解密的可逆
法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该
提出了矩阵池的概念,
密钥的预配置建立在多个密钥矩阵之
,节省了节
的存储空间,增强了
络的可扩展性。
加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
声明:以
例句、词性分类均由互联
资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观
;若发现问题,欢迎向我们指正。