cipher

美 [ˈsaɪfər]英 [ˈsaɪfə(r)]
  • n.密码;零〔即0〕;阿拉伯数字;密码索引
  • v.计算;〔美口〕算出;运算;用密码书写
  • 网络暗号;密文;加密算法

复数:ciphers 现在分词:ciphering 过去分词:ciphered

ciphercipher

cipher

n.

1.[u][c]密码;暗号a secret way of writing, especially one in which a set of letters or symbols is used to represent others

密码

电脑常用英语单词 ... breach 攻破、违反 cipher 密码 ciphertext 密文 ...

暗号

暗字的解释---在线新华字典 ... 暗害〖 stabintheback〗 暗号〖 password;countersign;cipher〗 暗话〖 argot〗 ...

GRE 词汇表(红宝书) - 豆丁网 ... cinder n. 余烬,矿渣 cipher n. ,无影响力的人,密码 circuitous adj. 迂回的,绕圈子的 ...

密文

l 如果采用密文cipher)形式,既可以是1~16个字符的明文,也可以是24个字符的密文。如:明文“1234567”对应的密文是“_(…

加密算法

接下来讨论加密算法Cipher)。加密算法有两种:对称加密算法和非对称加密算法。

欣技

上海睿浩实业有限公司 ... SYMBOL 讯宝 Cipher 欣技 ZEBRA 斑马 ...

暗码

暗字的解释---在线新华字典 ... 暗里〖 secretly〗 暗码〖 secretcode;cipher;codemessage〗 暗器〖 hiddenweapon〗 ...

小人物

Sinograma -... ... 仙人掌[ cactus] 小人物[ small potato;no man;cipher;unimportant person] 心上人[ lover;sweetheart] ...

1
The Cipher Card can be used to any computer with USB interface, furthermore, its fixing is simple and its use is convenient. 该加密卡可应用于任何一台具有USB接口的计算机终端上,而且安装简单、使用方便。
2
For starters, every possible Cipher configuration is always represented by an instance of javax. crypto. Cipher. 对于初学者,每个可能的加密配置总是由一个javax.crypto.Cipher实例表示。
3
You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks. 以这种方式继续一块接一块地生成每一个块的密文形式。
4
In the interest of science, I will cipher it out on the hypothesis that it is masculine. 出于本人对科学的爱好,我假定它应该是阳性的。
5
On the surface, the Enigma cipher machine looked like a regular typewriter, but it wasn't. 从表面看,英格玛密码机就像是一台普通的打字机,但实际上它却另有用途。
6
The P-valued logic functions satisfying K order propagation criterion have been used widely in the design of block cipher. 满足K次扩散准则的p值逻辑函数在密码设计中有重要应用。
7
If the plain text to be encrypted contains substantial repetition, it is feasible for the cipher text to be broken one block at a time. 如果要加密的纯文本包含大量重复的块,则逐块破解密码文本是可行的。
8
This was a kind of a motor cipher that you can encode into the muscle system and use to induce a variety of ideas in participants. 这是一种运动神经密码,你可以给肌肉系统编码,然后利用它来诱发参加者们的大量思想活动。
9
The listener then deciphers this according to his own reference of blueness and transmits it to you in his own cipher. 然后听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。
10
and the lock core is matched with a set of or two sets of mechanism cipher locking mechanisms. 锁芯配有一套或两套机构密码锁定机构。
11
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits. 即美国国家数据加密标准(theUnitedStatesDataEncryptionStandard),是一个块密码算法,块长8字节,密钥长56位。
12
One way to compromise data encrypted with this type of cipher is to perform an exhaustive search of every possible key. 可以危及用此类型密码加密的数据的一个方法是,对每个可能的密钥执行穷举搜索。
13
We asked the post office to fault the telephones, and went in to make a visual inspection of the cipher room area. 我们让邮局给电话弄点儿故障,然后进入大使馆对密码室所在的位置作一番目视观察。
14
The cipher's strength is not in its design; anyone could design something like that. The strength is in its analysis. 密码的强度不在于其设计,任何人都可以设计类似的东西,它的强度在于分析。
15
If a bit in the cipher text is mangled , the corresponding bit of plain text will be mangled . 如果密码文本块中有一个位出错,相应的纯文本块也将出错。
16
Amount of ceramic tile of the computation that press a plan uses ceramic tile gross plus place of cipher out of normal construction loss. 按图计算瓷砖数量再加上正常施工损耗算出所用瓷砖总量。
17
American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. 美国20世纪的数据加密标准DES是到目前为止使用最广、讨论最多的分组密码算法之一。
18
S-boxes are the only nonlinear components in many block cipher algorithms, and they decide the security strength of the whole algorithm. S盒是许多分组密码唯一的非线性部件,它的密码强度决定了整个密码算法的安全强度。
19
One of the cipher clerks came out and engaged our escort in animated conversation . 有一个译电员走出来与我们的陪同人员热烈地交谈起来。
20
Using the certificate(s), cipher parameters are passed between the client and server to set up the secure connection. 使用证书,在客户机和服务器之间传递密码参数,以建立安全连接。
21
The privatization of CPU is to cipher the instruction and data, store only encrypted data in external memory out of CPU. CPU私化是通过加密指令和数据,使其对外部以密文存在,来达到私化的目的。
22
The block cipher with a substitution permutation network is the best known and widely used block cipher system. 包含代替置换网络的分组密码是一种广泛使用的分组密码系统。
23
The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration. 提出一种基于混沌迭代的加密算法,这种加密算法根据混沌迭代确定的位置将明文填入一个较大的密文空间。
24
Although it tends to execute more slowly than stream cipher, block cipher is more secure. 尽管块密码的执行速度慢于流密码,但块密码更安全。
25
Given that a specific cipher has no major design flaws , key length is the primary determinant of security . 如果某个加密算法没有大的设计缺陷,那么密钥长度就是安全性的决定因素。
26
The result of the encryption of the last 8-byte block (discarding all previous cipher blocks) is the outcome of Step 9. 第9步的结果是最后8字节块的加密结果(放弃所以以前的密文块)。
27
Brute force attack on block cipher algorithm is an important direction of cryptology . 暴力破解分组密码算法是密码学的重要研究方向。
28
Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process. 建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。
29
But though the Kid's moral maturation is heartening, his personality remains largely a cipher, as anonymous as his lack of a name. 然而,虽然这孩子的道德观念走向成熟令人振奋,但他的性格特点,在很大程度上,仍然无足轻重,就像他的名字一样,荡然未存。
30
Electronic certification service systems shall be built by entities qualified for producing cipher code products for commercial uses. 电子认证服务系统应当由具有商用密码产品生产资质的单位承建。