ENCRYPTION SCHEMES 中文是什么意思 - 中文翻译

加密方案

在 英语 中使用 Encryption schemes 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
The server can designate preferred encryption schemes, for example.
例如,这个服务器可以指定首选的加密方案
Before then all encryption schemes were symmetric-key(also called private-key).:478.
之前所有加密方案都是对称密钥加密(也称为私钥)。
What will all this eventually mean for encryption schemes of the future?
这一切最终对于未来的加密机制来说有什么意义呢??
Symmetric encryption schemes rely on a single key that is shared between two or more users.
对称加密方案依赖于两个或多个用户之间共享的相同密钥。
Wireless security mechanisms include strong authentication and encryption schemes.
无线安全机制包括了强有力的认证和加密模式
The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists.
云计算服务供应商应该提供证据,证明其加密方案是由经验丰富的专家设计和检测的。
Efficient chip enables low-powerdevices to run today's toughest quantum encryption schemes.
这种高效芯片使低功耗器件能够运行当今最严格量子加密方案
The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists.
云计算供应商应提供证据,证明他们已设计了加密计划,并通过了经验丰富的专家们的验证。
Quantum computing could potentially break those codes quickly,destroying current encryption schemes.
量子计算机则可能很快摧毁这些加密防御体系
Hybrid encryption schemes let you send a lot of encrypted data with very little overhead by only doing the expensive part once.
混合加密方案允许您通过仅执行一次昂贵的部分,以极少的开销发送大量加密数据。
If you really want your wireless data to be protected,you need to use more secure encryption schemes such as WPA.
如果你确实想让你的无线数据得到保护,你应该使用更安全的加密方法,如WPA。
Many modern encryption schemes, like the widely used RSA cryptographic algorithm, rely on the inability to factor such numbers in a reasonable amount of time.
许多现代加密方案,例如广泛使用的RSA加密算法,都依赖于无法在合理的时间内分解这些数字。
Therefore, in cases where security is of high importance, you will want to use other measures,including various encryption schemes.
因此,在安全性非常重要的情况下,您将需要使用其他措施,包括各种加密方案
Wireless Encryption Protocol(WEP), one of the first encryption schemes for protecting wireless networks, has proven to be insufficient to keep out determined attackers.
无线加密协议(WEP)是保护无线网络最早的几种加密方案之一,如今已被证明不足以阻挡攻击者。
Johansen was acquitted of all charges andhas continued to defeat many popular digital encryption schemes via reverse-engineering.
约翰森最终被判无罪释放,此后他通过反向工程破解了许多流行数字加密体系
Net organizes projects like cracking data encryption schemes(legally) and searching for Optimal Golomb Rulers(measuring systems used in radio astronomy and X-ray crystallography).
Net组织如crackingdataencryptionschemes破解数据加密算法(合法)和searchingforOptimalGolombRulers寻找优选的Golomb标尺(在射电天文学和X-射线结晶学方面使用的测量系统)的项目。
Consequently these industries have made a strong effort both to encrypt their products andto lobby the government to mandate encryption schemes.
因此,这些行业也做出了强有力的反击,包括将他们的产品加密,并游说政府授权加密方案
A, Archiveus, Krotten, Cryzip,and MayArchive began utilizing more sophisticated encryption schemes, with ever-increasing key-sizes.
A、Archiveus、Krotten、Cryzip和MayArchive等蠕虫病毒开始使用更复杂的RSA加密方案,同时密钥大小不断增加。
Various theories about the code have been tossed around over the years,including that it was created using semi-random encryption schemes; anagrams;
有关代码的各种理论多年来一直在被抛出,比如,它是使用半随机加密方案创建的;字谜游戏;.
In 2009,IBM's Craig Gentry created the first fully-homomorphic encryption scheme.
年,IBM的CraigGentry创建了第一个完全同态加密方案
This meant that modern computers could break the encryption scheme within minutes.
这意味着现代计算机可以在几分钟破解加密方案
This type of encryption scheme is often called“shared secret” encryption, or“secret key” encryption..
这种类型的加密方案通常称为“共享秘密”加密或“秘密密钥”加密。
In 2009, however,IBM researcher Craig Gentry came up with the first fully homomorphic encryption scheme.
年,IBM的CraigGentry创建了第一个完全同态加密方案
This meant that modern computers could break the encryption scheme within minutes.
这意味着,现代计算机可以在几分钟内就破解该加密方案
We begin with a recap of the ElGamal encryption scheme.
第二种演算法为ElGamalEncryptionScheme
SSL was born around 1995, and its encryption scheme demanded a high quality PRNG.
SSL诞生在1995年,它的加密方案需要高质量的PRNG。
Gaudry concluded that encryption scheme used in part of the code“is completely insecure, explaining:.
Gaudry得出结论,部分代码中使用的加密方案“完全不安全,解释如下:.
To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.
要使用对称加密方案,发送者和接受者必须事先安全地共享保密密钥。
The zero-knowledge proof is an encryption scheme proposed by S. Goldwasser, S. Micali, and C.
零知识证明(Zero-KnowledgeProof),是由S.Goldwasser、S.Micali及C.
The zero-knowledge proof is an encryption scheme proposed by S. Goldwasser, S. Micali, and C.
零知识证明(ZeroKnowledgeProof)是由S.Goldwasser、S.Micali及C.
结果: 67, 时间: 0.0284

单词翻译

顶级字典查询

英语 - 中文