1、

But I have encrypted this letter with one of our most esoteric ciphers . Its words are safe from these yokels.

但我用了我们最深奥的密码来撰写这封信的具体内容,所以由这些乡巴佬送信是非常安全的。

互联网摘选

2、

The handshake of RDP that adopts this ciphersuite can avoid man-in-middle attacks.

采用这个密码套件的远程桌面协议握手过程能够避免中间人攻击。

互联网摘选

3、

In this paper three newly proposed stream ciphers S1, S2 and S3 are analyzed.

对3个新近提出的流密码S1,S2及S3进行了分析。

互联网摘选

4、

We present three new practical key schedule schemes based on the triple encryption NTE and stream ciphers respectively.

基于三重加密NTE给出了一种新的密钥编排方案;

互联网摘选

5、

Alan was right in thinking that H M Government was concerned with codes and ciphers.

艾伦的想法是对的,女王政府确实很关心编码与密码问题注,

互联网摘选

6、

Block ciphers'security mostly depends on S box that is the only non-linear structure in most block ciphers.

分组密码的安全性很大程度上取决于分组密码中唯一的非线性结构S盒。

互联网摘选

7、

The complexity and the degree of the algebraic expression for the Sbox are symbols of resistance of block ciphers against the interpolation attacks.

插入攻击是一种针对代数式次数和复杂程度低的分组密码的攻击方法。

互联网摘选

8、

Bent function and the finite state machine combiner in stream ciphers

流密码中Bent函数与有限状态机组合器

互联网摘选

9、

A Divide-and-Conquer Attack on Self-Synchronous Chaotic Ciphers

对自同步混沌密码的分割攻击方法

互联网摘选

10、

By comparison with Data Encryption Standard ( DES), the concept to design new key generation algorithm of block ciphers was analyzed.

通过与DES比较,分析了新一代分组密码的密钥生成算法的设计思路。

互联网摘选

11、

The advantages and implementations are discussed about random algorithms of block ciphers. Some implementations are described about random algorithms in block ciphers CAST and SAFER+, which are called random box, random network and random group respectively.

讨论了分组密码随机算法的优点和实现问题,并描述了随机算法在CAST和SAFER+中的若干实现,分别称为随机盒、随机网络和随机群。

互联网摘选

12、

The 2D geologic profiles are plotted using professional CAD software by means of interactive geology deciphers and the data is exchanged from the CAD software to the system. And thus the geological structure surfaces can be constructed using the NURBS technique.

运用地质交互式解译法在专业CAD软件中绘制二维地质剖面图,系统直接与其进行数据交换,利用NURBS技术完成对地质结构面的构造。

互联网摘选

13、

Excellent stream ciphers need a high pseudo-randomness, that is to say the key stream bits need to meet the Golomb pseudo-random theorem: balance, correlation and run-length distribution.

优秀的流密码算法要求所产生的密钥流具有高度的伪随机性,即需要满足Golomb伪随机三公设:均衡性、自相关性、游程分布。

互联网摘选

15、

Security Evaluation for a Class of Block Ciphers Based on Chaotic Maps

一类基于混沌函数的分组密码的安全性评估

互联网摘选

16、

A million is 1 with six noughts/ ciphers after it.

一百万是一后面加六个零。

外研社英语同义词辨析词典

17、

As you can see, working with JDK Ciphers is quite a cumbersome task.

如你所见,使用JDK Cipher是一项相当繁重的任务。

互联网摘选

18、

One followed by two ciphers is 100.

1的后面跟两个0是100。

外研社英语同义词辨析词典

20、

Professor Walt said: 'We need to make some additional advances with respect to more colours, different "ciphers" and demonstrate long term storage before one could consider such an application.'

瓦特教授还说,“我们需要更多的颜色来说明密码,并且需要长时间的维持信息的储存。”

互联网摘选

  • 今日热词
  • 热门搜索

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈