替代攻擊 的英文怎麼說

中文拼音 [dàigōng]
替代攻擊 英文
substitution attack
  • : Ⅰ動詞1 (代替) replace; substitute for; supply [take] the place of 2 [書面語] (衰敗) decline Ⅱ...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 替代 : substitute for; supersede; replace; substitution; replacement
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Since the trebuchets can also attack units directly, they ' re the star city raider until the discovery of cannons

    因為投石機也能直接單位,它們算得上是城利器,直到加農炮發明才會被
  2. Their size parameters, the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed ; chapter three use sympletic geometry to construct authentication codes with arbitration, some parameters and the largest probability of successful attack are also computed ; chapter four is about lattices generated by transitive sets of subalgebras under finite chevalley groups

    並計算了相關參數及成功偽造和成功換的最大概率;第三章在辛幾何的基礎上構造了具有仲裁的認證碼,亦計算了相關參數及各種成功的最大概率;第四章討論了有限域上chevalley群作用下的子數軌道生成的格。
  3. Instead of attacking during your surface attack step, this unit can make a local smoke screen. a sector containing a smoke screen has concealment. remove the smoke screen at the end of the next turn

    這個單位可以在回合中釋放區域煙幕彈來地面,一個煙幕彈可以包含一個區域,在下一輪結束時煙幕消散。
  4. The module of customer certification adds one - off password certification to the traditional sheet certification, and replaces stored password with stored digest of user password to guard against attacks and keep secrets

    用戶認證模塊在傳統基於表單認證的方式上增加一次性口令認證,並且在密碼存儲時以存儲用戶密碼消息摘要密碼本身,從而達到防和保密的目的。
  5. The automatic control system, as a critical technology, has an irreplaceable effect in keeping flight security and promoting attack efficiency. so high - qualified flight control system is necessary for completing the complex flight missions

    飛行自動控制系統作為現飛機的一項關鍵技術,在保持飛機飛行安全和提高效率方面起著不可的作用,所以高性能的武裝直升機的飛行控制系統的設計和使用是保證其完成復雜飛行任務的必要條件。
  6. In the paper, we construct the pseudorandom generator based on the hamilton array code and stream cipher after researching the theory of the hamilton array code and the technology of the encrypt. it can improve the ciphers " ability of resisting to many attacks if we use it to replace the key schedule algorithm of the ciphers

    本文在研究了hamilton陣列編碼的理論與加密技術后,構造了一個基於hamilton陣列編碼和序列密碼的偽隨機產生器,這個產生器用來分組密碼演算法的專用密鑰編排演算法,可以提高演算法的抗能力,從而實現了對稱密碼兩大領域的結合。
  7. It works like a shield, with the dementor feeding on it rather than him

    .它就像一面盾牌,他會巫師承受攝魂怪的
  8. . . it works like a shield, with the dementor feeding on it rather than him

    . . .它就像一面盾牌,他會巫師承受攝魂怪的
  9. Although these replacements are often referred to as " secure standard applications, " they are not absolutely immune to attacks

    盡管這些者通常被稱為「安全的標準的應用程序」 ,但是它們並不是絕對不會受
  10. Also, it is possible for an active adversary to substitute and exchange individual blocks without detection

    另外,隨時準備的對手可能在您沒有察覺的情況下和交換個別的塊。
分享友人