隨機密碼 的英文怎麼說

中文拼音 [suí]
隨機密碼 英文
random cipher
  • : Ⅰ動詞1 (跟; 跟隨) follow 2 (順從) comply with; adapt to 3 (任憑; 由著) let (sb do as he li...
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 隨機 : random stochasticrandom
  1. In advances in cryptology - eurocrypt 88, lncs 330, springer - verlag, davos, switzerland, may 1988, pp. 225 - 232

    如果分組對選擇明文是安全的,則稱它是超偽的。
  2. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義編方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙相位加變換,得到原信息的加灰度圖;通過4f光學系統計算模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  3. Parrish had an appointment online a female prostitution, last december 8 pm, with two fruit knives, tape, sleeping pills and other tools for committing crimes to prostitution woman shelter, and other complications occurred relations suddenly noted a sinister, drawing fruit knife threatened her with prostitution its tied up, then called the waiting outside help herself, prostitution woman found a home of times, snatched two cell phones, a necklace, computer and other valuables, 1, 200 yuan in cash and bank cards, joke meal beaten women for prostitution, questioned the bank card passwords

    范某在網上約好了一名賣淫女,去年12月8日下午,兩人帶著水果刀、膠帶、安眠藥等作案工具來到賣淫女的住處,范某和對方發生關系后突然面露兇相,掏出水果刀威逼著賣淫女將其捆綁起來,后叫來了在外等候的郝某幫忙,將賣淫女的家搜了個遍,搶走手2部、項鏈1條、電腦等貴重物品, 1200元現金及銀行卡,范某對賣淫女一頓暴打,逼問出了銀行卡
  4. At first, double random phase encoding techniques are looked back and its improved methods are introduced in detail. in connection with characteristics of spherical wave gene and function of phase mask, one random phase encoding techniques are proposed with spherical wave based on 4f system

    本文首先對雙相位加技術進行了回顧,並對它的一些改進方案的特點作了詳細介紹,並在此基礎上,根據球面波相位因子的特點和相位掩模在加解中作用,提出了一種利用球面波照射4f系統的單相位編的新方法。
  5. Cascaded low - density erasure codes are based on sparse random bipartite graphs. very efficient linear time encoding and erasure recover algorithms with the arbitrarily near erasure channel capacity performance of the codes with respect to the algorithms have made them one of the most optimal coding techniques up to now

    基於稀疏二部圖的級聯型低度糾刪因其線性時間的編譯演算法和可任意逼近刪除通道容量限而成為目前最佳編技術之一。
  6. The pki environemt including development interface such as pem and der encoding and decoding, symmetry cryptography, rsa algrothm, random numeric generate, certificate request pkcs # 10 encoding and decoding, x. 509 certificate encoding and decoding, digital abstract, digital signature and verifying signature, digital envelope and advance services such as certificate authority and register authority

    為滿足設計需要的pki底層支持和上層服務平臺,本文設計和實現了pki環境,包括底層開發介面: pem與der編解、對稱加數產生、 rsa演算法、證書請求pkcs # 10封裝與解、 x 509證書和黑名單編解、數字摘要、數字簽名與驗證、數字信封等和上層服務:認證中心和注冊中心。
  7. This paper discusses a algorithm of file encryption based on random factor

    本文提出一種基於數列的文件加演算法。
  8. With the e - portal, clients may access their password protected e & m engineering facilities database in emstf maintained venues, anywhere, anytime. they can also send us an email anytime requesting a quote for specific services, reporting faults or asking questions

    有了電子網站,客戶可利用地進入營運基金服務場地的電工程設施數據庫、發送電郵要求我們就某服務報價、報告故障或提出查詢。
  9. Returns a pseudo - random key from a password, salt and iteration count

    、 salt值和迭代次數返回偽鑰。
  10. 4 lee c y, lu e h, lee j y. bit - parallel systolic multipliers for gf fields defined by all - one and equally - spaced polynomials. ieee trans. computers, 2001, 50 : 385 - 393

    近些年來,有限場數值運算被廣泛應用在編理論計算數字訊號處理,邏輯設計,和數產生器等領域上,受到相當大注意。
  11. After deeply studying all kinds of problems of current actualization methods, we put forward to a new actualization method of the technology of physical isolation on the base of cpld. we make a lot of research on data encryption and describe the design method of the encryption chip on the base of lfsr ( linear feedback shift register ). after putting forward to the whole design procedure, we design an encryption chip on the base of lfsr, which can provide the high - quantity data stream of encrtption

    在深入研究了常見物理隔離技術實現方案中存在的各種問題后,提出了一種基於cpld的全新實現方案;同時,對于存儲信息的加也進行了研究,詳細闡述了基於移位寄存器的非線性組合序列的設計方法,提出了完整的設計流程,並設計了一個基於fpga的非線性組合反饋序列晶元,該晶元能提供高質量的偽鑰流。
  12. And coming up with a random password and writing it down so you don t forget it subverts the whole concept of security

    如果確定一個隨機密碼並把它寫下來,這樣雖然不會忘記,但又破壞了安全性的整體概念。
  13. Generates a random password of the specified length

    生成指定長度的隨機密碼
  14. A convenient mechanism for generating a random password is the

    用於生成隨機密碼的便捷制是
  15. The random password created by the

    方法創建的隨機密碼不一定能通過
  16. However, the random password will meet the criteria established by the

    但是,該隨機密碼將符合由
  17. Generates a random password that is at least 14 characters long

    生成長度至少為14個字元的隨機密碼
  18. Generates a random password

    生成隨機密碼
  19. Randpass - a high - performance random password generator which can generate millions of passwords in seconds

    一個高效的隨機密碼生成器,每秒鐘可以生成成百萬的
  20. But the problem is, people don t select passwords that are truly random because random passwords are harder to remember

    但是問題在於,因為較難記住隨機密碼,人們所選的並不是真正的。
分享友人