单词 | Cipher |
例句 | 1 The message was written in cipher. 2 The glasses were engraved with the Queen's cipher. 3 It's a telegram in cipher. 4 They couldn't cipher out how she got there. 5 I couldn't cipher out his motives. 6 He's a mere cipher in the company. 7 At work, she was a cipher, a functionary, nothing more. 8 To her employers she was a mere cipher, with no human feelings at all. 9 The interim government is a mere cipher for military rule. 10 If you have no children, enter a cipher in the space on the form. 11 The army uses a special cipher so that military messages are kept secret. 12 The embassy was ordered to destroy its cipher equipment and remaining codes. 13 When I felt outrage was I simply a cipher for cultural prejudice? 14 No one is a cipher, and Maloney tries to give his subjects a character, a singular demeanour and poise. 15 One bears the Romanov double-headed eagle, another the cipher of the Grand Duchess Elizabeth. 16 He was a cipher to me, a silent man of abstracted benevolence, and I never got to know him well. 17 I was a cipher in this company. 18 He's a figment, a cipher, jabberwocky. 19 A symbol used in secret writing; cipher or code. 20 The British were constantly increasing their cipher security. 21 Politically, he was a cipher. 22 A device for translating plain text into cipher. 23 I am now ready for cipher block chaining. 24 I couldn't cipher out why she was there. 25 Cipher: Our free trial of kungfu has expired. 26 The block cipher with a substitution permutation network is the best known and widely used block cipher system. 27 A pair of rock crystal goblets engraved with the cipher of Peter the Great. 28 His straight heavy sword hung in a gilded scabbard by his royal blue saddle-cloth that was embroidered with the King's cipher. 29 The first would be to protect Britain's own secrets by developing the necessary cipher machines, codes and operating procedures. 30 This paper proposes a matrix based substitution permutation network as the model of block cipher. 1 The message was written in cipher. 2 It's a telegram in cipher. 31 However, block cipher algorithms tend to execute more slowly than stream ciphers. 32 The block cipher coprocessor has been applied in a PCI-FPGA cipher card designed by the Information Security Technology Laboratory of Guangzhou University. 33 A differential cryptanalysis of the iterated block cipher based on the new round function is presented. 34 I every menstruation date is different, such can is cipher out safe period with crises? 35 According to MIMEprotocol, the key, digital signatUre and cipher text are packaged and processed at the both sides. 36 The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration. 37 This paper introduces a completely nonsingular matrix based substitution permutation network that can effectively improve the performance of the block cipher against linear cryptanalysis. 38 Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function. 39 The cipher message begins with a large 534 does it not? 40 Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network. 41 Set forth a cipher synchronization scheme in the connectionless oriented IP layer,(sentence dictionary) also present the state transform map of this secure protocol. 42 In many cipher system, the pseudo random sequence generator is an important part in system security. 43 The born of AES and the launching of NESSIE project, bring a new climax of block cipher research all over the world. 44 In this paper, a general cryptograph system called GCS is presented. Its core is a general cipher de-vice based on the technique of coding the algorithm. 45 Before we can encrypt, we need to know the size of the buffer required for the cipher text . 46 The acceleration mechanism can be used in acceleration of clock-controlled sequence generator and key preset of stream cipher generator. 47 Therefore, we can use this to build up a cipher text communication pipe for data transferring between clients and servers of database systems to preserve data confidentiality and integrity. 48 According to the property that all states of a certain cellular automata can build a permutation group, we can design block cipher based on this property. 49 Pseudo random sequence has broad applications in stream cipher , channel coding, and spread spectrum communication. 50 Based on the encryption principle of affine cipher, a frequency transition function of DFH is designed. 51 In order to keep pace with the accreditation of wireless network and cipher code, the wireless public key system is researched. 52 Determine the block size. If a block cipher is used. 53 A new block cipher is designed where the diffusion of matrix multiplication is combined with the confusion of specially designed matrix operation to encrypt information. 54 If you have duplicate blocks within your plain text stream, you will have duplicate blocks within your cipher text stream. 55 Probe into the design principle of cipher systems irrelevant to computing power, design cipher systems with provable safety, and analyze the defects of existent cipher systems. 56 This hidden information can be plain text, cipher text, or even images. 57 Firstly, this thesis researches the correlative design technology of USB Cipher Card. 58 Block cipher in output feedback mode is used to implement the end - to - end key stream generator. 59 IDEA encryption algorithm is data block encryption algorithm ( Cipher Block ) category. 60 The invention relates to a digital cipher code protection device, especially a grille window small display screen cipher code theft-proof device used for ATM and counter of bank. 61 The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher. 62 It then calls the encryption method getEncryptedData, which returns a Base 64 encoded cipher text string. 63 All important plans were sent to the police in cipher. 64 I will not write down his real name even in this bothersome Yiddish - letter cipher. 65 Then a chaotic stream cipher based on the pseudo-random number generator is designed, which has high security, low cost and easy realization proved by some experiments. 66 Cryptography will be spread for the cipher text to achieve copyright protection. 67 Rijndael encryption algorithm is the grouping variable length block cipher. 68 It is very convenient to do cash withdrawal, accounts checking, cipher amending and funds allocating, etc. 69 In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages. 70 This was a kind of a motor cipher that you can encode into the muscle system and use to induce a variety of ideas in participants. 71 NATO experts believe that the contents of the cipher text description of the Russian general lack of troop combat capability to make up with nuclear weapons to force the Russian military. 72 DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits. 73 The part written in cipher – turned out after examination to be entirely unpublishable. 74 For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode. 75 Based on existing block ciphers and combined with characteristic of processor architecture, this paper has a research on high performance processor architecture for block cipher algorithms. 76 One of the cipher clerks came out and engaged our escort in animated conversation. 77 The technical documents on commercial cipher shall be kept by special persons who shall take corresponding confidentiality measures to prevent the divulgence of commercial cipher technologies. 78 To write ( a message, for example ) in code or cipher. 79 CBC The Cipher Block Chaining ( CBC ) mode introduces feedback. 80 The concept and design principle of reconfigurable cipher coprocessor are proposed in this paper. 81 Security and other performance are analysed, the probability of correct decipher of these Block error correcting cipher systems is also discussed in noise channel. 82 It accepts a Base 64 encoded cipher byte array, and decodes and decrypts it to return the clear data string. 83 I have declared a byte array named ivBytes, which will hold the initial vector bytes for each step of the cipher block chaining. 84 A symbol used in secret writing; a cipher or code. 85 In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods. 86 It shifts the letter in the plain message n character backwards to get the cipher text. 87 Its cipher code is basically the golden standard of Internet security, and it doesn't sell subscriber lists. 88 The Enigma machine was an advanced electro - mechanical cipher machine developed in Germany after World War 1. 89 He was little more than a cipher who faithfully carried out the Fuehrer's commands. 90 One byte of cipher text is generated for every byte of plain text contained in the message. 91 The cipher text string is then passed to the getCipherDataDoc private method. 92 From a corner of the room, the old ecstatic gaucho - in whom Dahlmann saw a summary and cipher of the South (his South) - threw him a naked dagger, which landed at his feet. 93 If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key. 94 Aim How to produce non - periodic sequence cipher by seed key. 95 This paper is devoted to design a variable size block cipher (VSBC) based on the first-order hyperbolic equation with mixed initial-boundary conditions. 96 Investigation shows that the scheme is provable security under the blockwise adaptive attack model if the underlying block cipher is a pseudorandom permutation. 97 This paper presents the relationship between the round key and the cipher key of the AES algorithm and proposes a mathematical model of the key expansion of AES algorithm. 98 I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters. 99 This paper presents the techniques to support encryption in ATM/SDH network and the cipher management protocol. Also a new approach to realize link encryption is proposed. 100 Pseudo-random sequence, as a code, has broad applications in spread spectrum communication, stream cipher, channel coding. 101 In cryptography, an early example of monoalphabetic, or substitution cipher used in the Gallic wars. 102 The paper describes the RSA arithmetic about cipher, showing the exponential expression of it. 103 At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data. 104 Bases on advantages of the old mechanical lock, and the new type cipher lock with Computerized Control System is designed. 105 The paper describes the RSA arithmetic about cipher, and shows the exponential expression of it. 106 The objective of this article is to find a mechanism for breaking a cipher text . 107 The research of "the cipher" in the 17 years rural novels is deficient in the critical field. 108 Using fumy cipher(), transmission data are kept secret that can prevent others from reading or writing data without permit. It can ensure data security. 109 He got his mistress , Madeleine Bayard , the job of cipher officer on board ship. 110 Cryptograph :a system of secret or cipher writing; a cipher. 111 You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks. 112 At last they managed to puzzle out the meaning of the cipher. 113 The cipher took me three weeks before I hit it. 114 If they do not have a cipher suite in common, then secure communication is not possible and CICS closes the connection. 115 American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. 116 Amount of ceramic tile of the computation that press a plan uses ceramic tile gross plus place of cipher out of normal construction loss. 117 The research should focus on the designing mechanism of cipher systems irrelevant to the computing power, and the cipher systems with provable safety. 118 The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data. 119 The so - called aloof cabinet was a cipher in algorism. 120 The Foreign Office have been pushing us for months to get something on the cipher. 121 The concrete example of this scenario in Cipher Text is the record editor. 122 The mode of encryption is CBC (Cipher Block Chaining) with 8-byte block size. 123 The record and statistic of telephone charging, the control of user grade and cipher code telephone are developed deveploped in this system. 124 Electronic certification service systems shall be built by entities qualified for producing cipher code products for commercial uses. 125 This sample uses the private key corresponding to the public key used to encrypt the data, and assumes you already have the cipher text created in the preceding example. 126 Therefore, using large completely nonsingular matrix based substitution permutation networks can effectively improve cipher security in relation to differential cryptanalysis. 127 Knew the area of hexagon, can change cipher out A. 128 Used present microprocessor AT89C51 as control part, designed a electronic trick lock. It can be set up some cipher code, changed many times and kept cipher code. 129 On the surface, the Enigma cipher machine looked like a regular typewriter, but it wasn't. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。