单词 | Cryptographic |
例句 | (1) Preventive measures include data encryption using various cryptographic methods. (2) CSP is the most generally cryptographic interface of PKI. (3) Creating a cryptographic scheme is not a trivial task. (4) The cryptographic algorithm is public in modern cryptography. (5) Protecting particular notes with a strong cryptographic algorithm. (6) The cryptographic providers you can use for your certificate are listed below. (7) We also present two new cryptographic indexes, fixed point and cyclic structure(/cryptographic.html), on which we investigate the performance of such permutation. (8) A hash is the result of a cryptographic function that takes an arbitrarily sized string of data, performs a mathematical encryption function on it, and returns a fixed-size string. (9) Block ciphers can be used in many cryptographic primitives, such as encryption and message authentication code (MAC). (10) In this paper, a bilateral-authentication cryptographic protocol is proposed. It is a more efficient and secure protocol, which solves the bottleneck problem of the trusted third party. (11) If the device only performs a simple cryptographic function, all of the objects must be managed by the software. (12) However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol. (13) Key management is the core of the symmetric cryptographic communication , and the key generation method is the foundation of the key management. (14) Cryptographic storage class does not support saving key data in this format. (15) The simulation software conducts the power analysis of cryptographic algorithm IP core which is described by hardware language. (16) Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm. (17) Provable Security is the essential requirement of modern cryptographic schemes. (18) The paper chiefly introduces a cryptographic solution about key recovery and key recovery capability by adding key recovery information to an IP datagram. (19) Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core. (20) Hurt was quickly hired, and several weeks later Friedman selected Harry Lawrence Clark as an assistant cryptographic clerk. (21) Information security is the basis of modern computer communication network, while modern cryptographic algorithm is also the core part of the information security. (22) This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security. (23) In cryptography, the result of securing a block of data by applying a cryptographic function. (24) JCA defines a series of Engine classes, where each Engine provides a cryptographic function. (25) A concrete design of nonlinear combining feed-forward sequence generator was presented. Cryptographic properties and the hardware logic structure of the generator were studied too. (26) This paper designs a RSA crypto-coprocessor based on the research of RSA cryptographic algorithm. (27) Only the source node and the destination node need operation of the asymmetric cryptographic algorithm once in a route computation. (28) This will replace the FIPS - ZZ 40 - ZZ cryptographic module with the Netscape internal module. (29) Second, the structure of the hardware test platform is determined through functional analysis of the testing platform of cryptographic algorithm. (30) Keystores -- key entry: This type of keystore entry holds very sensitive cryptographic key information, which is stored in a protected format to prevent unauthorized access. (31) Cryptographic transform libraries in OpenBSD include Blowfish, Data Encryption Standard (DES), 3DES, and Cast. (32) Traditionally, the security of cryptographic chips depends on the mathematic complexity of the cryptographic algorithms, the authentication mode and the secure protocol. (33) We refer to the Prover-computed response as the presentation proof; it is a cryptographic proof of possession of the private key corresponding to the presented U-Prove token. (34) So, the design of the platform is of great meaning and effect in the research and design of cryptographic algorithm. (35) Affine inverse functions derived from the inverse function composed with affine permutations possess good cryptographic properties. (36) Electronic warfare, such as radio - electronic or cryptographic means. (37) Version 3 uses a digital signature to sign cryptographic keys and messages. (38) Brute force attack on cryptographic algorithm is an important branch of cryptology. (39) The API also loads token-specific modules (STDLLs) that provide the token-specific operations (cryptographic operations, session management,(http:///cryptographic.html) and object management). (40) The jamming signal is produced by cryptographic algorithm, with good restoration resistance. (41) Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step. (42) Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols. (43) Side - channel attacks are serious practical threat against implementation of cryptographic algorithms. (44) Due to good cryptographic properties, orthomorphisms play an important role in cryptography for resisting cryptanalysis. (45) Adnan began applying differential cryptoanalysis and similar standard cryptographic techniques. (46) Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped creating packet loss. (47) Certificate Services is generating the cryptographic key and setting key protection. (48) However, with a good cryptographic hashing function, it should be extremely difficult in practice to find two intelligible strings that hash to the same value. (49) We propose a new cryptographic key dynamic access scheme with time-constraint and can solve the problems we mentioned above. (50) DES cryptographic algorithm used to encrypt important data, files, safe. (51) Secondly, in order to develop and apply AES algorithm better, and design cryptographic algorithm independently, the paper deeply research the design principle and security of the AES algorithm. (52) Biometric template cryptographic key cannot be revealed without a successful biometric authentication. (53) This firmware is available on a limited basis from IBM, and essentially turns the 4758 Coprocessor into a cryptographic processor. (54) The Cryptographic Service Provider is not supported by Message Queuing. (55) Corresponding to public key cryptographic algorithm, it can save energy consumption because the receiver can aggregate cryptograph directly instead of obtaining explicit terms. (56) Describes how to create a cryptographic key pair for signing an assembly. (57) Phase modulator and amplitude modulator are both indispensable optical modulator in quantum cryptographic communication. (58) Cryptographic algorithm and key are the very important part of cryptogram technology. (59) Strand space theory is a method for stating and proving correctness properties for cryptographic protocols. (60) Analysis of cryptographic protocol is significant for secure communication between computer systems through networks. (61) Provide the realization scheme of the simulated distributive and parallelized cryptographic algorithm. (62) In a quantum cryptographic system, any interloper tapping into the stream of photons will alter them in a way that is detectable to the sender and the receiver. (63) It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols. (64) The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols. (65) Encrypted cryptographic key, which need to be saved in the extern media, was encrypted with Password-Based Encryption technology and was saved in the computer file system. (66) The security of public key algorithm is based on mathematic problems, anal the security of symmetric cryptographic algorithm is based on the key length. (67) Therefore, the testing of cryptographic algorithm is of practical significance. (68) The termless security of B92 quantum cryptographic key protocol is built under the quantum non-clone principle and Heisenberg non-accurate measurement principle. (69) A cryptographic service provider is an independent software module that performs cryptography algorithms for authentication, encoding, and encryption. (70) Version 4 adds a private channel to transmit a digital signature to sign cryptographic keys and messages. (70) try its best to collect and build good sentences. (71) The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method. (72) And it is very much helpful to the development of cryptographic products. (73) Cryptographic attack based on trapdoor is presented, examples are given. (74) This project includes research of hardware design, research of system software design and research of implementation of cryptographic algorithm. (75) All cryptographic keys will be deleted and should be exported before continuing. (76) With the development of Internet, the packet processing and cryptographic applications become an important issue of secure communication in the Internet. (77) Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure. (78) A cryptographic service provider could not be found for this algorithm. (79) This awareness runs from the pedestrian (such as not showing plaintext in a password field on a login page) to dizzying heights of cryptographic methods (such as DES, MD5, SHA1(), Blowfish). (80) Polynomial modulo reduction algorithms are one of the fundamental issues of computer algebra, and widely used in coding algorithms and cryptographic system design. (81) As a major public-key cryptographic algorithm, RSA cryptographic algorithm occupies an important position in the operator's authentication of electricity market operation system. (82) The password information is stored in your computer's cryptographic storage database. (83) These are very simple cryptographic algorithm, is now rarely used in practical applications. (84) Two cryptographic methods for storage of graphic information are proposed in this paper. (85) It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol. (86) The algebraic system defined on the points of an elliptic curve can be used to construct various cryptographic schemes. (87) The study of techniques for deciphering cryptographic writings or systems. (88) Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered. (89) They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。