cryptogram

1. The ECC and classical public key cryptogram system are compared.
比较了ECC与经典公钥密码体系间的优劣;

youdao

2. Cryptographic algorithm and key are the very important part of cryptogram technology.
密钥和密码算法的安全是密码卡的核心和关键。

youdao

3. Strand space model is a new formal analysis tool to the analysis of cryptogram protocol.
串空间模型是一种新兴的密码协议形式化分析工具。

youdao

4. It is necessary to mix address code in transform process of input TOD as block cryptogram.
地址码必须如分组密码方法那样,混淆在对TOD输入的变换过程之中。

youdao

5. Why wouldn't Saknussemm have hidden an incredible invention behind this confusing cryptogram?
为什么萨克努姗不能把不可思议的发现隐藏在打乱的密码里呢?

youdao

6. Cryptogram programming of confidential information is an effective tool for ensuring information security.
机密信息的密码化是保证信息安全的一种有效手段。

youdao

7. Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function.
加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。

youdao

8. Lastly, the mixed cryptogram arithmetic was implemented and applied into the application of email encryption.
最后,实现了混合加密算法,并将其应用于加密发送电子邮件中。

youdao

9. In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced.
本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。

youdao

10. Therefore, the key of the efficient executing elliptic curve cryptogram is the efficient computing of multiple point.
因此倍点运算的快速计算是椭圆曲线密码快速实现的关键。

youdao

11. High performance cryptogram server provides a safe, highly effective platform of cryptogram programming of information.
高性能密码服务器提供了一个安全、高效的信息密码化平台。

youdao

12. In terms of the difference between encryption key and decryption key, it can pide into symmetry cryptogram and public key cryptogram.
根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。

youdao

13. Software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.
软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。

youdao

14. The information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.
尽管安全技术涉及的范围十分广泛,但密码技术是各种安全技术的核心。

youdao

15. Considering RSA is one of the most popular public key cryptogram algirithms, a new group signature scheme completely based on RSA is proposed.
考虑到RSA是应用最广泛的公钥密码体制之一,首次基于RSA设计出一种群签名方案。

youdao

16. The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。

youdao

17. RSA Public Cryptogram algorithm is based on Theorem of Euler, whose security depends on the difficulty about the factor decomposed of great number.
RSA公钥密码算法的基础是欧拉定理,它的安全性依赖于大素数因式分解的困难性。

youdao

18. He regarded the universe as a cryptogram set by the almighty-just as he himself wrapt the discovery of the calculus in cryptogram when he communicated with Leibnitz.
他将宇宙视为上帝用密文书写的文件——恰如他与莱布尼兹通信时,把自己关于微积分的发现用一种加密的方式书写一样。

youdao

19. Later in the war, the curator of the cryptogam herboriam was drafted to Bletchley Park because somebody misread cryptogam – tiny, non-flowering plants – as cryptogram.
战争后期,隐花类草本馆馆长被调到了布莱奇利公园,因为有些人把隐花植物误解为——小型无花植物。

youdao

20. Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。

youdao

21. Secure Electronic Transaction protocol(SET) has guaranteed security problem in the electronic payment process through formulating standard and using cryptogram technology.
安全电子交易协议SET通过制定标准和采用各种密码技术手段,确保了电子支付过程中的安全问题。

youdao

22. The technical of cryptogram which refer to this paper is discussed firstly. And the emphases of this discussion are about the elliptic curve cryptographic algorithms and authentication.
本文首先对论文中所涉及的密码技术作了介绍,重点讨论了椭圆曲线加密算法和几种常见的身份认证技术。

youdao

23. The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.
在传输方面,采用已通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。

youdao

24. Give me problems, give me work, give me the most abstruse cryptogram, or the most intricate analysis, and I am in my own proper atmosphere. I can dispense then with artificial stimulants.
给我难题,给我工作,给我最深奥的密码,给我最复杂的分析工作,这样我才觉得最舒适,才不需要人为的刺激。

youdao

25. Give me problems, give me work, give me the most abstruse cryptogram, or the most intricate analysis, and I am in my own proper atmosphere. I can dispense then with artificial stimulants.
给我难题,给我工作,给我最深奥的密码,给我最复杂的分析工作,这样我才觉得最舒适,才不需要人为的刺激。

youdao