解密卡 的英文怎麼說

中文拼音 [jiě]
解密卡 英文
hp5x00ciss-a
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 解密 : deciphering
  1. It is just the difficulty that the strongly correlated electron systems can not be studied by analytical methods, a variety of simulative numerical methods come out sequentially. there are a few typical methods such as the exact diagonalization ( ed ), the qutum monte carlo ( qmc ), the variation monte carlo ( qmc ), the renormalization group ( rg ), and the density matrix renormalization group ( dmrg ) and so on

    正是強關聯系統遇到了析研究的困難,各種數值模擬方法才相繼出現,最典型的數值方法有:嚴格對角化( ed ) ,量子蒙特洛( qmc )模擬、變分蒙特洛模擬( vmc ) 、數值重整化群( rg )以及度矩陣重整化群( dmrg )等。
  2. The fameg fs8101cssl is the state - of - the - art solution for low - cost, high - performance, usb1. 1 hostable with mp3 interface controller. it is designed for embedded usb mass storage class applications with ub1. 1 host specification compliance

    它集成了內嵌ice功能的高速8051內核e8051d ,高兼容性高性能的usb2 . 0控制器標準的des tdes安全加引擎, sd介面以及plif介面等。
  3. This design implements the data encrypt card and the image compress flatform and grounds for the cipher and compress arithmetic

    設計實現了數據加解密卡和圖像壓縮平臺,為加演算法和壓縮演算法的實現打下物質基礎。
  4. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰碼體制rsa和ecc演算法及加實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加和數字簽名。 ( 3 )討論了橢圓曲線在智能上的應用,並提出了兩種基於ecc的身份認證方案。
  5. The holy key to the gates of heaven that unlocked our wisdom, it is the secret code for smooth passage through the series of roadblocks on the path to eternal liberation

    天國之門的聖鑰,開啟我們智慧的大門,通過層層關碼,暢行無阻,永恆脫。
  6. Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card

    在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論文針對有條件接收系統,按不同用途、不同類型分別設計並實現了存儲用戶授權及智能應用的文件體系結構,通過該cos的指令系統,設計並實現了模擬前端授權控制信息( entitlementcontrolmessage , ecm ) 、授權管理信息( entitlementmanagementmessage , emm )數據生成模塊及用戶端ecm 、 emm模塊。
  7. In order to make the theoretical calculation feasible, we first obtain an analytical formalism of partial integrals with respect to the coordinates of the core and target in the phase - shift functions and their cross terms of scattering matrix elements, if the density distributions of the core and target are fitted to a few gaussian forms. then the rest multidimensional integrals with respect to the impact parameter and coordinates of halo nucleons are performed by a monte carlo method

    為使理論計算變得可行,我們在核芯和靶核度採用多個高斯分佈擬合的情況下,析求了各個散射矩陣元中的光學相移函數及交叉項含有的與暈核核芯、靶核度分佈有關的積分;同時對與碰撞參數和暈核子坐標有關的積分(八重以上,並且積分維數隨暈核子數很快增加)採用蒙特洛方法計算。
  8. We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation

    並給排列碼加操作賦予相應的命令應答對,結合智能操作系統的安全模塊中的rsa演算法和md5演算法,提出了使用這種數字簽名進行文件安全傳輸的過程。
  9. We also believe that the software addresses the following requirements : experience in the china marketplace ; real time transactions ; ease of use ; reliable and detailed account information ; system expandability ; internet based ; where no bank / credit card is available, payment can be made when client deposits money with a financial institution which holds the money for the client ( knows as an electronic purse ) ; transactions and transaction data be encrypted with the state - of - the - art network security technology ; free registration ; low cost of transaction ; and on - going technical assistance and support

    我們也相信該軟體滿足以下要求:在中國市場的經驗;實時交易;使用簡單;可靠和詳細帳戶信息;系統擴展性;基於網際網路;無銀行和信用可用的地方,當顧客存款到擁有顧客資金的金融機構(了作為電子錢包) ,支付可以進行;交易和交易數據可以被藝術級的網路安全技術加;免費注冊;交易低成本;和正在進行的技術援助的支持。
  10. A smart card ' s microprocessor generates complex passwords that are difficult to decode and biometric markers such as fingerprints and retina patterns that are hard to forge

    而智慧的微處理器則能產生難以破的復雜碼,以及不易偽造的生物辨識標記,例如指紋、掌紋、聲紋和視網膜圖紋。
  11. In this article, two projects - " sqy - 15 encrypt subsystem of hospitalization insurance system " and " general image compress flatform " are combined to get a resolvent scheme to realize data encrypt and image compress based on digital signal processor ( dsp ) and application specific integrated circuits ( asic ). this article includes three key technologies in designing and realizing the data encrypt card and the image compress flatform. they are : ( 1 ) design of dsp application system ; ( 2 ) epld designing technology using vhdl language ; ( 3 ) pci interface technology

    本文結合「 sqy - 15醫療保險信息系統加子系統」和「通用圖像壓縮平臺」兩項目,提出了基於數字信號處理器( dsp )和可編程專用集成電路( asic )實現數據加和圖像壓縮平臺的決方案,重點介紹了基於dsp的數據加解密卡和圖像壓縮平臺設計與實現中的三個關鍵技術: ( 1 ) dsp應用系統設計; ( 2 ) vhdl語言設計epld技術; ( 3 ) pci介面技術。
  12. The major work is as following : the main problem that the encrypt subsystem of hospitalization insurance system is analyzed, and the scheme using dsp technology to realize encrypt arithmetic is brought out. the data encrypt card using dsp chip, pci interface chip, asynchronism fifo chip and epld that realize the control of the data encrypt card is designed and implemented

    主要做了以下幾方面工作: ( 1 )分析了醫療保險信息系統加子系統需要決的主要問題,提出了採用dsp技術實現加演算法的數據加決方案; ( 2 )數據加解密卡的硬體設計和實現。
  13. High degree of encryption the card can monitor single step interrupt and breakpoint interrupt through hardware so as to recognize and intercept various debug attempts. through hardware algorithm, the card restores the encrypted software. but the hardware algorithm cannot be tracked

    度較高加通過硬體監控單步中斷和斷點中斷,從而識別和截獲各種跟蹤企圖;加通過上的硬體演算法來對加軟體進行還原,而硬體演算法是無法跟蹤的
  14. In this paper we mainly study the realization of digital signature card based on permutation code

    本文主要研究基於排列碼加演算法的數字簽名智能的實現。
  15. The computer data encryption card pcijmc2000 en / decrypts data with dsp running software encryption program and fpga sealed with block cipher

    計算機數據加pcijmc2000採用dsp與fpga實現數據加、, fpga中固化有分組碼演算法, dsp運行軟體加演算法。
  16. This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies

    本文首先介紹了應用碼學的基本概念,然後介紹了目前常用的加技術,認真分析了對稱鑰加方法、公開鑰加方法等加技術的優缺點,提出了一種新型的分組加方法? ?排列碼加演算法以及基於該演算法的保散列數字簽名演算法,並將其應用於信用系統,從而在一定程度上降低了信用因遺失、被盜、假等因素造成的損失。
  17. A dedicated processor is responsible for the encryption and decryption process. as such, the risk of exposure of private key carried by a smart card is low

    內的一個專用處理器會負責這個加的程序,以減低外泄內私人碼匙的風險。
  18. When the secure system is cracked by the hacker, the enterprises must change all the source decoder which has been placed in the stb, it will cost much more than the followed scheme, smart card scheme

    如果將模塊從碼器中分離出來,置於安全性能極高的智能中,一旦系統安全受到威脅,僅通過更換相對廉價的智能,就會避免數字電視運營商遭受巨額經濟損失。
  19. There are seven chapters in this paper. ln chapter one, we describe the actual state of driver development. in chapter two. we can see the basic knowledge of nt kernel - mode driver. after this, in chaper three are some informations about pci data encryption device card. the ways to deal with the very difficult and important issues will be explained in detail in chapter four. the latest two chapters will describe how to install the driver and how to test the driver

    在第二章中將介紹在開發過程中必備的nt系統內核模式環境基礎知識,接著在第三章中針對性介紹必要的pci總線加硬體知識,第四章開始正式決編寫程序中遇到的關鍵問題。最後兩章分別對驅動程序的安裝方法和測試驅動程序的一些問題作了說明。
  20. Chapter 5 discusses the characteristic and structure of decoding chip - sti5518, studies its signals and program interface functions of smart card. at the end of this chapter, gives the smart card decryption solution of sti5518

    第五章,重點研究了目前市場上主流的機頂盒碼晶元sti5518的結構、特點及其介面信號及函數,並提出了sti5518的智能方案。
分享友人