解密的 的英文怎麼說
中文拼音 [jiěmìde]
解密的
英文
unclassified-
Her work on internet cryptograms helped disrupt
她關于網際網路加解密的工作幫助了And what kind of decoder ring comes with that, man
有什麼解密的戒指和它一起嗎To cache decrypted private keys, and introduce
隱藏已經解密的專用密鑰,還將介紹Listen, send me the decrypted files over to my pda
聽著,把解密的文件發到我的pda上The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways
本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。That will perform the encryption and decryption
選項可標識將執行加密和解密的One special feature of this paper is that it provides fast implementation means for the all kinds of modular exponentiation algorithms, which facilitate the implementation of the rsa public key algorithms. the paper improved the sliding window algorithm by largely reducing the space complexity. meanwhile this paper represents an efficient combined algorithm to improve the processing of encryption and decryption
大數模冪乘運算是實現rsa等公鑰密碼的基本運算,其運行效率決定了rsa公鑰密碼的性能,文章主要研究了各種模冪演算法的快速實現方法,提出運用組合演算法的思想來減少演算法運行時間;並對滑動窗口取冪演算法進行了部分改進,用線性表來存儲預計算數據,從而減少了演算法的復雜度,進一步提高了rsa加/解密的效率,並在試驗測試中得到較為滿意的結果。Does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files
並沒有提供使用私鑰對文件進行簽名或解密的權限,但它允許用戶驗證文件簽名並加密文件。Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key
此類非對稱轉換較比使用對稱密鑰進行加密和解密的方法,其開銷更大。In the design and analysis of block cipher, considering the noncontinuity of encryption and decryption of advanced encryption standard - rijndael algorithm and the arbitrariness of the choice of polynomialm ( x ), we change the modular polynomial and the polynomials used in process of encryption and decryption, which the encryption polynomial and the decryption polynomial are the same polynomials in our choices. the new algorithm have more continuity
在分組密碼的設計與分析方面:針對美國即將推出的高級加密標準rijndael演算法的加解密的不一致性和rijndael演算法中模多項式的選取隨意性,我們修改了rijndael演算法中的模多項式和加解密所用的多項式,使得加解密取相同的多項式,這樣加密與解密具有更多相容性。Object contains the xml element to decrypt
對象包含要解密的xml元素。Chloe, i still need the decrypted files
克羅伊,我還是需要解密的文件Object that contains an asymmetric key to use for decryption
對象,包含用於解密的不對稱密鑰。Access decrypted configuration information in an asp. net page
訪問asp . net頁中已解密的配置信息。To view the decrypted configuration values
查看已解密的配置值Is used to decrypt the message received from the sender
另一條用以把從發件人收取的信息解密的稱為A stream object that contains an
流對象,包含要解密的Consider a system in which all information is transparently encrypted and decrypted by the database
考慮一個這樣的系統,所有信息是由數據庫透明地加密或解密的。Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption
公鑰加密是使用一對非對稱的密鑰加密或解密的技術。In this part, the function definition and structure partition are finished, then every part is depicted with verilog hdl. by verilog - xl tools, behavior simulation is achieved. the chip logic function that is encrypting 1024bit data is realized
在設計的過程中,完成了整體的結構劃分,使用veriloghdl硬體描述語言進行了電路的rtl級描述,並利用了candence公司的verilog - xl完成了軟體平臺上的行為級模擬,實現了1024位數據的加密解密的邏輯功能。分享友人