What is the translation of " CRYPTOGRAPHIC ALGORITHMS " in Chinese?

加密算法
的密码算法

Examples of using Cryptographic algorithms in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
ChaCha20 and Poly1305 cryptographic algorithms.
ChaCha20和Poly1305密码算法.
It's true for cryptographic algorithms, security protocols, and security source code.
这是真正的加密算法,安全协议和安全的源代码。
The FIPS 140 standard defines approved cryptographic algorithms.
FIPS140标准定义了已批准的加密算法
It's true for cryptographic algorithms, security protocols, and security source code.
对于加密算法、安全协议和安全源代码来说是这样的。
Most importantly,TLS 1.0 does not support modern cryptographic algorithms.".
最重要的是,TLS1.0不支持现代加密算法
Using approved cryptographic algorithms and tested protocol implementations can provide basic protections.
采用经过批准的密码算法和经过测试的协议实施能够提供基本的保护。
TLS v1.1 and v1.2 are both without known security issues,but only v1.2 provides modern cryptographic algorithms.
TLSv1.1和v1.2都没有已知的安全问题,只有v1.2提供了现代的加密算法
We do not prescribe specific cryptographic algorithms to these neural networks;
我们不对这些神经网络事先输入已有的加密算法;.
If large-scale quantum computers are ever built,they will compromise the security of many commonly used cryptographic algorithms.
如果构建大规模量子计算机,它们将危及许多常用加密算法的安全性。
The IKEv2/IPsec protocol employs very strong cryptographic algorithms and keys to significantly increase your security and privacy.
然而,IKEv2/IPSec利用非常强大的加密算法和密钥增加用户的安全和隐私。
By now, the most fundamental technical difference between Bitcoin andLitecoin are the varied cryptographic algorithms which they use.
到目前为止,比特币和莱特币之间最基本的技术差异是他们使用的不同的密码算法
We will use many information technologies including cryptographic algorithms to make sure that the digital currency cannot be counterfeited.
我们将运用包括密码算法在内的多种信息技术手段,来保障数字货币的不可伪造性。
That's why a U.S. government agency has challengedresearchers to develop a new generation of quantum-resistant cryptographic algorithms.
这就是为什么美国政府机关开始鼓励研究人员去开发新一代抗量子破解的密码学算法。
Google has built machinelearning systems that can create their own cryptographic algorithms- the latest success for AI's use in cybersecurity.
谷歌的机器学习系统最近创建了属于自己的加密算法,这是AI在网络安全中获得的最新成功。
But for starters, you have to have solid knowledge of algorithms and data structures,most importantly cryptographic algorithms.
但对于初学者来说,你必须有扎实的算法和数据结构知识,最重要的是加密算法
One such example isbreaking security protocols that are based on cryptographic algorithms, as mathematician Peter Shor pointed out in 1994.
一个这样的例子就是破坏了基于密码算法的安全协议,正如数学家彼得·肖尔在1994年指出的那样。
But, as far as we know now, the performance advantages of quantum computing do notpresent fatal problems for other important cryptographic algorithms.
但是,就我们现在所知,量子计算的性能优势并不会给其他重要的加密算法带来致命的问题。
Blockchain cryptographic algorithms are a secure shield protecting consumers' data and are one of the most robust encryption standards currently available.
区块链加密算法是保护消费者数据的安全屏障,是目前可用的最强大的加密标准之一。
Google's common cryptographic library is Tink5, which implements cryptographic algorithms using BoringSSL6.
Google的通用加密库是Tink5,它使用BoringSSL6实现加密算法
Miruna Rosca, a PhD student in post-quantum cryptography, tells Decrypt you would probablyneed around 4000 qubits to break current cryptographic algorithms.
MirunaRosca是后量子密码学的一名博士生,他说,破解当前的密码算法可能需要大约4000个量子位。
SPYRUS hardware andsoftware support uses the strongest commercially available cryptographic algorithms, including all Suite B algorithms and legacy algorithms such as RSA and triple-DES.
SPYRUS硬件与软件支持市面上最强大的加密算法,包括所有的SuiteB算法以及RSA和triple-DES等传统算法。
Until these post-quantum solutions are established or standardized,platforms must be flexible and capable of changing cryptographic algorithms on the fly.
在这些后量子解决方案建立或标准化之前,平台必须是灵活的,能够在飞速写入中更改加密算法
Indeed, it is believed that quantum computers willbe able to break various asymmetric cryptographic algorithms(such as RSA or ECC) within the next 20 years.
事实上,据称量子计算机将能够在未来20年内攻破各种非对称加密算法(例如RSA或ECC)。
The report acknowledges that virtual currencies(VCs)“are often referred to as‘cryptocurrencies' because themajority of VCs rely extensively on use of cryptographic algorithms.”.
该报告承认,虚拟货币(VC)通常被称为“加密货币”,因为大多数风险投资公司都广泛依赖于使用加密算法
Each of the CSPs that are configured to be used by a certificatetemplate can potentially support different cryptographic algorithms and, therefore, different key lengths.
配置为由某个证书模板使用的每个CSP都可以潜在支持不同的加密算法,因此,可以支持不同的密钥长度。
Miruna Rosca, a PhD student in post-quantum cryptography, tells Decrypt you would probablyneed around 4000 qubits to break current cryptographic algorithms.
MirunaRosca是后量子密码学的一名博士生,他告诉Decrypt可能需要大约4000个量子位来破解当前的密码算法
Kelby Ludwig has written an explanation of the LLL algorithm, which is a lattice-basedmethod that can be used to attack some cryptographic algorithms.
KelbyLudwig写了一个关于LLL算法的解释,该算法是一种基于格子的方法,可以用来攻击一些加密算法
For example, in 1996 researchers reported the first weaknesses in MD5,a type of widely used cryptographic algorithm called a hash function.
例如,在1996年,研究人员报告了md5中的第一个弱点,md5是一种被广泛使用的称为哈希函数的加密算法
AES is a new cryptographic algorithm that can be used to protect electronic data.
AES是一个新的可以用于保护电子数据的加密算法
Results: 29, Time: 0.0276

Word-for-word translation

Top dictionary queries

English - Chinese