混合密碼 的英文怎麼說

中文拼音 [hún]
混合密碼 英文
mixed cipher
  • : 混形容詞1. (渾濁) muddy; turbid2. (糊塗; 不明事理) foolish; stupid
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 混合 : (攙雜在一起) mix; blend; mingle; admix; mixture; mix up; interfusion; commixture; blending; cre...
  1. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。
  2. The usefulness of chaos in cryptography depends on the natural relationship between the two research areas : strong dynamical properties of chaotic systems imply strong cryptographical properties of cryptosystems, and the basic way to design cryptosystems containing good strong cryptographical properties implies quasi - chaos

    這一想法來自於沌理論和傳統學之間的自然聯系:一個強的沌系統的動力學特性大致對應著高強度系統的某些安全特徵,而具有良好性的傳統系統又暗示著擬沌現象。
  3. Because of the intrinsic relationship between chaotic systems and cryptosystems : strong dynamical proterties of chaotic systems imply strong cryptographical properties and strong cryptographical properties imply quasi - chaos. chaotic systems, which act as natural cryptosystems, are applied into the cryptography

    由於沌系統和學之間存在著一些自然聯系:強沌系統的動力學特性大致對應著高強度系統的某些安全特性,而具有良好性的傳統系統又暗含著擬沌現象,沌系統作為一種天然的系統,被引入到學領域。
  4. Hybrid bit - flip decoding algorithm for ldpc codes

    度校驗比特反轉譯演算法
  5. Ecc is considered to be an alternative to rsa. this article provides a brief description of rsa public key cryptography and the associated knowledge, in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3, in - depth studies present existed scalar multiplication, further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates, the improved algorithm compatible the advantage of the naf, has the least number of zero window and avoid a large number of inverse operation, successfully reduce scalar multiplication calculation

    本文闡述了橢圓曲線及其相關知識,特別說明了建立在有限域fp (其中p是大於3的素數)上的非奇異橢圓曲線e ,深入研究目前已有的各種標量乘法,由此提出了橢圓曲線演算法在坐標下改進的帶符號滑動窗口演算法,該演算法兼容了naf方法的優點,擁有最少數目的非零窗口數,又避免了域元素上的大量求逆運算,較成功地減少了標量乘法計算量。
  6. For the strongest system security, use a password of at least 7 characters, and use a mixture of uppercase and lowercase letters, numbers, and other characters such as *, ?, or $

    為了具有最高的系統安全性,至少要7個字元,並應採用大寫字母、小寫字母和數字以及其他字元(例如* 、 ?或$ )的形式。
  7. Abstract aiming at the defects of diffusion function with lower diffusing speed and needing multiple round iteration to resist differential attack in the image encryption algorithm based on chaotic block cipher, a new chaotic image encryption algorithm based on output ? cryptograph mixed feedback was proposed

    摘要針對現有基於沌分組的圖像加演算法中,擴散函數擴散速度慢、需要多輪迭代才能抵抗差分攻擊的缺點,提出了一種新的基於文和輸出反饋的沌圖像加演算法。
  8. A hybrid attack will add numbers or symbols to the filename to successfully crack a password

    攻擊將數字和符號添加到文件名以成功破解
  9. Obviously rc6 is not square - like cipher. square attack can only attack few rounds of rc6, because the data - rotations of rc6 affact the rules of propagation for active and passive words, which makes square attack ineffective. we analyse the square attack against serpent which is bit - oriented cipher, and the result shows that square attack on serpent is weak, because the bit - oriented linear operations interrupt the rules of propagation for active and passive multiset

    我們將square攻擊應用於rc6,發現square攻擊只能攻擊少數幾輪rc6 ,這主要是因為rc6的數據依賴循環運算打亂了活動位元組和固定位元組的傳播路徑,使得攻擊無法進行。我們分析了對serpent的square攻擊, serpent的按比特線性運算打亂了所構造multiset的傳播路徑,使得攻擊只能進行到3輪serpent
  10. Precaution 3 : our passwords should consist of a combination of numbers, upper and lower case letters

    個人守則之三:我們的個人應該採用由數字及大小寫英文字母而成的組
  11. ( 2 ) a new digital frequency - hopping communication system based on cipher - quasi - chaotic sequence is proposed, which combines the cryptography and frequency - hopping technology. the system ' s protocol, base - band signal processing and modulation / demodulation algorithms of the radio - frequency part are designed, and the hardware experiment conducted on a prototype of the system show that the system functions well. the finite precision problem arising while taking use of chaotic signal to generate pseudo - random sequence is studied and the anti - tracking capability of the cipher - quasi - chaotic sequence is studied with the volterra - tls method proposed in this dissertation

    ( 2提出一種新的基於飩序列的與跳頻技術相結的跳頻通信系統,並且進行了協議部分、拂信號處聊分、射頻調制解調演算法部分的模擬研究和系統的硬體實驗研究;研究了利用飩信號產生偽隨機序列的有限精度實現問題,利用本文提出的m業肚m 113方法對飩序列產生的跳頻的抗鵬干擾能力進行了模擬實驗研究。
  12. Certain kind of attacks on some block ciphers may be efficiently resisted by mixing the round keys with a group of frequently changed numbers computed from system time and the counter of data blocks

    摘要通過將系統時間和數據組號到輪鑰之中,可以有效地防止一些對分組演算法的攻擊。
  13. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場以及其工作機制; 3研究了當前常用的各種數據加解機制以及演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于的文獻資料,了解目前的研究動態和成果,研究體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類體制進行了實現,並為它編寫測試代評估其性能。
  14. Password strength guidelines : you can see the strength of the password change by the number of key symbols that appear up to five keys. you can see five keys appear after you enter a complicated key with mixed - case alpha - numeric characters that include special characters, such as the following example : mickeymouse43 @ 0243

    Password strength準則:通過顯示的鑰匙符號的數目(最多5把鑰匙) ,您可以看到的強度的變化。當您輸入了一個由包含特殊字元的大小寫的文字數字式字元構成的復雜后,您可以看到會顯示出5把鑰匙,比如下面的例子: mickeymouse43 @ # 0243 。
  15. In this theme, combined public key system composed by ecdh key exchanging algorithm and block crypt system is introduced

    在本課題中引入了由ecdh鑰交換演算法和分組構成的公鑰體制。
  16. A two - dimensional one - way coupled map lattice is proposed for cryptography of self - synchronizing stream cipher, which n ^ 2 space units produce chaotic stream outputs in parallel

    摘要提出了由單向二維耦的映象格點組成新的時空沌自同步流系統,它能夠產生並輸出n ^ 2個平行沌流
  17. In this dissertation, a novel method designing s - box is proposed, which combined chaotic cryptography and computing intelligence. in addition, the cryptographic properties such as the bijective property, the strict avalanche criterion, the nonlinearity, the output bits independence criterion and the equiprobable input / output xor

    本論文中,不僅提出了運用沌系統構造s盒的新方法,而且還首次把學和計算智能演算法相結,提出了一種新的s盒的設計方法。
  18. As qzkvjd biotechnology becomes more sophisticated and powerful, and as the genetic code smt of more organisms is identified, biologiosts will learn how to mix genes uof different microbes to create unnatural strains that cana e turned i xntoteadly, effective 762720265 weapons

    隨著生物技術變得越來越復雜和強大,隨著越來越多的有機體的基因被識別出來,生物學家們將會研究出如何各種不同類型的微生物以製造出非天然的病菌,可以將它們製成致命而威力強大的武器。
  19. Then a draft is given. with this draft, the problems of various products of region and the system structure unmatching is resolved, and the security of system is improved by u sing the mix cryptogram

    接著文章給出了一種基於lon總線的小區智能卡系統集成方案。該方案解決了小區產品協議多元化和面向各種應用的體系結構不匹配等問題,並使用混合密碼體制提高了系統安全性。
  20. It is recommended that you should change the default pin, length 8 characters

    建議您修改一定要將預設修改,建議樣式為文數字,長度8個字元
分享友人