塊密碼 的英文怎麼說

中文拼音 [kuāi]
塊密碼 英文
block clipher
  • : 名詞(古時佩帶的玉器) penannular jade ring (worn as an ornament in ancient china)
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密碼類使用稱作鏈( cbc )的鏈模式,它使用一個鑰和一個初始化向量( iv )對數據執行加轉換。
  2. Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time

    通常,私鑰演算法(稱為塊密碼)用於一次加一個數據
  3. Specifies the block cipher mode to use for encryption

    指定用於加塊密碼模式。
  4. The block cipher mode encodes data one block at a time

    塊密碼模式一次一對數據進行編
  5. Block ciphers with long keys are stronger than stream ciphers

    使用長鑰的塊密碼比流更強。
  6. However, block cipher algorithms tend to execute more slowly than stream ciphers

    但是,塊密碼演算法執行起來通常比流慢。
  7. Although it tends to execute more slowly than stream cipher, block cipher is more secure

    盡管塊密碼的執行速度慢于流,但塊密碼更安全。
  8. Because each block is heavily processed, block ciphers provide a higher level of security than stream ciphers

    由於每都被嚴處理,因此塊密碼比流提供更高的安全級別。
  9. A simple block cipher that does not use an initialization vector will encrypt the same input block of plain text into the same output block of cipher text

    ,一個不使用初始化向量的簡單塊密碼將把相同的明文輸入為同樣的文輸出
  10. Firstly, a formal description of the cryptographic protocols of tpm is made using svo logic

    首先,使用的svo邏輯建立可信平臺模塊密碼學協議的形式化描述,然後進行推理分析。
  11. Then logic reasoning is made on the formal description. through reasoning and analysis, some secure vulnerabilities are found in the cryptographic protocols of tpm, and repair methods are also proposed

    在推理分析中,也發現了可信平臺模塊密碼學協議的一些安全漏洞,並在分析的基礎上修復了這些安全漏洞。
  12. Information technology - security techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm

    信息技術.保技術.採用數據塊密碼運演算法的加檢驗功能的數據集成機構
  13. Block ciphers use the same encryption algorithm for each block

    塊密碼對每個使用相同的加演算法。
  14. Information technology - security techniques - modes of operation for an n - bit block cipher

    信息技術安全技術n位塊密碼演算法的操作方式
  15. Information technology - security techniques - hash - functions part 2 : hash - functions using an n - bit block cipher

    信息技術安全技術散列函數第2部分:採用n位塊密碼的散列函數
  16. Information technology - security techniques - hash - functions - part 2 : hash - functions using an n - bit block cipher

    信息技術.安全技術.散列函數.第2部分:使用n位塊密碼的散列函數
  17. Information technology. security techniques. hash - functions - hash - functions using an n - bit block cipher algorithm

    信息技術.保技術.信息函數.第2部分:使用一個n -位數據塊密碼演算法的信息函數
  18. The analysis is also made on the cryptographic protocols of tpm

    因此,也對可信平臺模塊密碼學協議的安全性進行了分析。
  19. I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so i pad the last incomplete block with some characters

    我對需要將明文數據位元組放在8位元組的加使用塊密碼演算法,所以我用一些字元填充最後一個不完整的
  20. I have provided support for the tripledes block cipher algorithm only for demonstration

    我已經對tripledes塊密碼演算法提供了支持,但只用於演示。
分享友人