cryptographic 中文意思是什麼

音標 [ˌkriptə'græfik]
cryptographic 解釋
關于暗號的, 用密碼寫的
  1. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。
  2. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。
  3. In this dissertation we present a general, extensible methodology that examines cryptographic protocols. our approach is specify a protocol in cpal ( cryptographic protocol analysis language ), apply hoare and dijkstra ? theory of formal semantics to it, analysis it ? forma ] semantics, define weakest precondition of each kind of language statement

    我們的方法就是用cpal ( cryptographicprotocolanalysislanguage )語言來表示協議,將hoare和dijkstra在形式語義方面的理論應用到該語言,分析該語言的形式語義,定義每種語句的最弱前置條件。
  4. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。
  5. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份攻擊等方面的問題。
  6. ( 2 ) the author introduces a new way to describe cryptographic protocol based on timed petri net, meanwhile, the concrete steps using tpn is expounded

    ( 2 )首次提出用時延petri網作為工具來分析和評估密碼協議,並且給出了用它分析和評估密碼協議的具體方法和步驟。
  7. One important aspect of the cryptographic algorithms localization is to eliminate the suspicion of a trapdoor

    密碼演算法本土化的一個重要方面是消除密碼演算法存在陷門的憂慮。
  8. Use this property to return a handle that is compatible with the unmanaged microsoft cryptographic api capi

    使用此屬性返回與非託管microsoft cryptographic api ( capi )兼容的句柄。
  9. As regards cryptographic algorithm, according to database encryption requirement for cryptosystem, we adopt block cipher, which is high intensity and fast, based on analysing and comparing several popular cryptographic algorithm ; and resolve cipher message expansion problem through making improvement of block cipher with " cipher message whmovement "

    在數據的加密演算法上,本文在分析比較目前常用的加密演算法的基礎上,依據數據庫加密對密碼系統的要求,採用了保密強度大且速度快的分組密碼;並用「密文挪用法」對分組密碼進行改進,解決了加密后數據擴張的問題。
  10. But at present, many mobile banking systems only use some cryptographic algorithms as security measures, without depicting the procedure of message exchanging as a secuity protocol, needless to say how to analyze it or provide the correctness proof of it

    但目前很多手機銀行系統中只是簡單的使用了若干密碼演算法作為安全措施,沒有把消息交換過程抽象描述成安全協議的形式,更談不上對其進行形式化的分析證明。
  11. Both common forms of cryptographic algorithms

    加密演演算法的兩種常見形式
  12. Supports many cryptographic algorithms

    支持多種加密演算法。
  13. Application of cryptographic algorithm in bluetooth security mechanism

    加密演算法在藍牙安全機制中的應用
  14. Determines the set of valid key sizes for the symmetric cryptographic algorithms

    確定對稱加密演算法的有效密鑰大小設置。
  15. Each csp contains the implementation of a specific set of cryptographic algorithms

    每個csp包含特定一組加密演算法的實現。
  16. Data cryptographic techniques - procedures for the registration of cryptographic algorithms

    數據加密技術.加密演算法的注冊程序
  17. Data cryptographic techniques. procedures for the registration of cryptographic algorithms

    數據密碼技術.密碼演算法的登記程序
  18. Ssl encrypts messages like most cryptographic algorithms with a secret key

    有幾個操作系統(諸如trusted solaris )確實做了分隔。
  19. The. net framework provides implementations of many standard cryptographic algorithms

    . net framework提供許多標準加密演算法的實現。
  20. The uniform resource identifier that describes the cryptographic algorithm associated with the

    值關聯的加密演算法的統一資源標識符( uri ) 。
分享友人