cryptography
美 [krɪpˈtɑɡrəfi]英 [krɪpˈtɒɡrəfi]
- n.密码学
- 网络密码术;加密;密码编码学
cryptography
cryptography
密码学
密码学(cryptography):目的是通过将信息编码使其不可读,从而达到安全性。 明文(plain text):发送人、接受人和任何访问消 …
密码术
心理学专业词汇翻译辞典 - MBA智库文档 ... cryptograph 密码 cryptography 密码术 cryptology 密码术 ...
加密
加密(Cryptography):允许开发人员在程序中使用加密技术和信号功能。 数据访问(Data Access):允许开发人员在程序中使用 …
密码编码学
密码学分为密码编码学(Cryptography)和密 码分析学(Cryptanalysis)。 密码编码学包括密码算法的设计和研究。
密码系统
IT专业英语词典-C ... cryptographer 译解密码者 cryptography 密码术,密码系统 crystal 晶体 ...
加密技术
加密技术(Cryptography)已经为人们所熟悉,广泛应用于各行各业。加密技术研究已有多年,有许多加密方法,但是由于加 …
密码技术
基本术语:密码技术(Cryptography)—把可理解的消息变换成不可理解消息,同时又可恢复原消息的方法和原理的一门科学 …
1
An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.
Java密码扩展系统的一个实现在Sun的网站中可以找到密码服务提供者的目录。
2
Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.
因此,使用量子加密将选票信息从投票站送往计票中心,也有那么点形象工程的色彩。
3
The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.
name属性可以是位于System.Security.Cryptography命名空间中的某个抽象类的名称。
4
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
5
Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe.
量子密码被证明是绝对安全的,其核心技术是量子密钥分配(QKD)。
6
Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based.
这些技术并没有打破量子密码学的基础理论。
7
The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography.
密钥对关系中的互补性本质使得通过公钥加密实现这种唯一标识成为可能。
8
The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world.
量子密码术的不可侵犯性,是建立在真实世界里不见得成立的一组假设上。
9
OpenSSL is the cryptography library used for SSL communications, and is required by mod_ssl to encrypt HTTP traffic for Apache.
OpenSSL是用于SSL通信的密码方法库,并且被mod_ssl用来对Apache的HTTP通信进行加密。
10
BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.
BLS短签名是双线性密码学中应用最为广泛的密码元件之一。
11
In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack.
另外,量子保密可以新的方法保护信息,从而避免经典攻击下的信息窃取。
12
Students should be able to analyse and prove the information protection capacity of modern cryptography basically after this course.
通过本课程的学习,要求能够从本质上分析和证明现代密码的信息防护能力。
13
The record-breaking MapReduce approach, he said, is useful in physics, cryptography and data mining.
他还介绍说,破记录的MapReduce方法在物理学,密码学和数据挖掘领域也是很有用的。
14
One of the main applications of single-photon sources is the quantum cryptography, or exactly, the quantum key distribution (QKD).
单光子源最重要的应用之一是量子密码术,确切的说,量子密钥分配(QKD)。
15
As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered.
伴随着技术的进步,特别是先进的互联网和密码学技术,使得传递重要信息的风险降低了。
16
The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography.
加密与解密数据的密钥的安全传输是现代密码学最棘手的问题之一。
17
Due to the various applications of the bilinear pairings in cryptography, there have been many pairing-based signature schemes.
由于双线性配对函数表现出的良好密码学特性,目前已经引起了众多关注。
18
Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology .
整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。
19
The strategy included a recommended set of advanced cryptography algorithms known as "Suite B" .
该政策包括一套推荐的高级加密算法,称为“SuiteB”。
20
The security of public-key cryptography depends on factorization or other difficult mathematical problems.
这种技术之所以安全,是因为应用了因数分解或其他困难的数学问题。
21
Since the one-time pad is theoretically proven to be undecipherable , quantum cryptography is the key to perfect secrecy.
因为一次插入被理论上证明是不被破译的,量密码术是完全保密的答案。
22
Quantum cryptography ensures complete privacy because any attempt to observe the transmission will change the message.
由于任何企图监测传输过程的举动都会造成所传输信息的改变,量子密码术确保了传输的完全保密。
23
With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values.
使用了公开密匙加密后,希望接收已加密消息的一方将创建一对密匙值。
24
For more precise control, you can use the System. Security. Cryptography classes as well.
要进行更精确的控制,也可以使用System.Security.Cryptography类。
25
A digital certificate is more than just a cryptography key; it is an online credential.
数字证书不仅仅是一个加密密钥,它还是一个在线凭证。
26
Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
27
This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature.
使用该类可方便地在VB应用程序中实现对称密钥、公开密钥和数字签名算法,并且不受中英文编码方式的限制。
28
Be signed with a strong name using standard public key cryptography.
使用标准公钥密码系统用强名称签名。
29
The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).
Windows密码API(cryptoAPI)密码服务提供程序(CSP)的名称。
30
Cryptography is the art of "secret writing, " as the word's Greek roots attest.
作为希腊的词根资产,加密技术是一种“神秘编写”艺术。