cipher

cipher

1. The numerical symbol0; a cipher.

0数字符号0;零

2. AES (advanced encryption standard) block cipher algorithm has been adopted as the block encryption standard.

AES是新的分组对称加密算法高级加密标准,源自比利时人Daemen和Rijmen共同设计的Rijndael算法。

3. The KCBC or KCTR-MAC authentication mode may be combined with the CTR(counter) encryption mode to form a new full block cipher mode.

KCBC或KCTR MAC认证模式和CTR(计数器 )加密模式结合可构成分组密码算法的新工作模式 .

4. The RC2CryptoServiceProvider object is a block cipher that encrypts and decrypts data in blocks of 8 bytes.

RC2CryptoServiceProvider对象是一个加密和解密8字节数据块的块密码。

5. Rijndael block cipher was designed by Joan Daemen and Vincent Rijmen of Belgium.

Rijndael算法属于迭代型分组密码,其开发者是比利时密码专家Joan Danmen和Vincent Rijmen。

6. RCA and RUC provide a structural sketch, analysis methods and design rules for the research of reconfigurable cipher processing architecture.

RUC模型和RCA模型为可重构密码处理结构的研究提供了基本的参考结构、分析方法和设计准则。

7. WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP是一种加密方案的基础上的RC - 4加密,即对所有802.11a,b和g无线的产品。

8. Whitenoise is a stream cipher proposed by the BSB Utilities Inc. In August 2003, Wu Hongjun proposed a breaking algorithm for Whitenoise.

Whitenoise是由BSBUtilities公司提出的一个序列密码算法。 Wu在2003年8月巧妙地给出了破译Whitenoise算法的一个解方程组方法。

9. "The only problem," Langdon said, "is that we don't have anything on which to apply the cipher.

“现在唯一的问题是,”兰登沉吟道:“我们找不到什么东西来套用这套密码。”

10. While a code might transform "attack" into "FRGPL" or "mincemeat pie", a cipher transforms elements below the semantic level, ie, below the level of meaning.

“编码”可以将“攻击”一词转换成“FRGPL”或“馅饼”,“密码”则作用在“语义层”之下。

11. A simple block cipher that does not use an initialization vector will encrypt the same input block of plain text into the same output block of cipher text.

一个不使用初始化向量的简单块密码将把相同的明文输入块加密为同样的密文输出块。

12. A cryptographer friend tells the story of an amateur who kept bothering him with the cipher he invented.

一个密码学家朋友跟我讲过一个故事,一个爱好者总爱用他发明的密码算法打扰他。

13. You do not have to open the key immediately before decrypting the cipher text.

不必只在解密密码之前才打开密钥。

14. Schneier provides a table showing relative encryption speeds of various block cipher algorithms in his.

中提供了一个表,其中展示了不同的块加密算法的相对加密速度。

15. Who would fall for that DNA is the cipher?

中文:谁会相信DNA就是密码呢?

16. He went to school at the age of forty, and learned to read, to write, to cipher.

他四十岁进学校,学习了读,写,算。

17. He's a mere cipher in the company.

他在公司里是个无足轻重的人物。

18. He is a mere cipher in our company.

他在我们公司纯粹是个无用之人。

19. He watched her dance, a random cipher drawing its signature across the time-slopes of this dissolving yantra, a symbol in a transcendental geometry.

他目视着她翩翩起舞,一个随机密码在这渐渐消融的印度教具的时间坡上画上了它的签名,那是超越几何中的一个符号。

20. There are many important documents in the cipher suitcase he is taking.

他随身携带的密码箱里,有很多重要的文件。

21. Pseudo random sequence has broad applications in stream cipher, channel coding, and spread spectrum communication.

伪随机序列在流密码、信道编码、频通信等领域有着广泛的应用.

22. C. Use the CIPHER command-line utility to decrypt the folder and its contents.

使用CIPHER指令行公用程式对资料夹及其内容解密。

23. A generally simple mechanism whereby plain text characters are replaced with other characters to form the cipher text.

使用其它字符替换明文字符以形成密文的一种常用简单机制。

24. Every morning the cipher clerk operating a Hagelin inside the embassy reset the wheels before beginning transmissions.

使馆内操作“哈盖林”机器的译电员每天早上在开始发报之前都重新给转轮定位。

25. Julius Caesar, for example, is known to have employed a simple substitution cipher to protect messages from unauthorized viewers.

例如传说中恺撒大帝就曾使用简单的替换加密来防止未经授权者读懂消息。

26. Information processing. Modes of operation for a 64-bit block cipher algorithm.

信息处理.64位字组码算法的运算方式。

27. Cryptology is the key technology of information security, which can be divided into three types: stream cipher, symmetrical cipher and asymmetrical cipher.

信息安全的核心技术是密码技术,它基本上可以分为三类:流密码、对称密码和非对称密码。

28. If be prefab stair, divide with dimensional height with stair length OK cipher out the footfall height of every step.

假如是预制的楼梯,用空间高度除以楼梯长度就可以算出每个台阶的踏步高度。

29. As an important example of the entire solution, we introduce a cipher scheme TCR6 which has some satisfactory features in both security and efficiency.

做为例子,给出了一个在安全和效率方面均有良好性能的密码算法TCR6。

30. A word that serves as a key to a code or cipher.

关键词密码或索引中重要的词

31. Keyword: FPGA, PCI, Logic Analyzer, Cipher Coprocessor, Experimental system.

关键词:FPGA;PCI;逻辑分析仪;密码协处理器;实验系统

32. The army uses a special cipher so that military messages are kept secret.

军队使用一种特殊密码,军事电讯因此得以保密。

33. IDEA is a symmetrical block cipher . End-to-end encryption based on IDEA is presented and analyzed.

分析了基于分组密码算法IDEA设计的端-端加密系统。

34. English: Failed to initialize the decryption cipher slot.

初始化解密密钥槽失败。

35. Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.

加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。

36. Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function.

加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。

37. The block cipher with a substitution permutation network is the best known and widely used block cipher system.

包含代替置换网络的分组密码是一种广泛使用的分组密码系统。

38. I will not write down his real name even in this bothersome Yiddish-letter cipher.

即使是用难以辨认的意弟绪语字母的密码,我也不愿意在这里写下他的真实姓名。

39. One way to compromise data encrypted with this type of cipher is to perform an exhaustive search of every possible key.

可以危及用此类型密码加密的数据的一个方法是,对每个可能的密钥执行穷举搜索。

40. It can properly satisfy the needs of practice of IC design, embed operating system as well as Logic Analyzer and Cipher Coprocessor.

可作为逻辑分析仪、密码协处理器使用,也可用于信息安全、IC设计、嵌入式操作系统等有关的研究、开发和实验。

41. Again, the result is similar to a stream cipher.

同样,结果类似于流加密。

42. Because of this, a block of plain text will always return the same cipher text when encrypted with the same key and algorithm.

因此,当用同样的密钥和算法加密时,纯文本块总是返回同样的密码文本。

43. Thus it is evident that the term Cipher is derived from the Arabic Sifr which in turn is quite close to the Sanskrit term Shubra.

因此显然地,术语Cipher是源自阿拉伯的Sifr,依次就是与梵语术语Shubra(萨巴拉)相当接近。

44. A multilateral asymmetric key cipher system was constructed based on the RSA cipher system and manifold signature schemes were designed in this way.

在 rsa密码系统上建立多元非对称密码系统 ,并以此针对多种签名形式设计多种签名方案

45. In 2005, Andreas Klein presented another analysis of the RC4 stream cipher.

在2005年,安德烈克莱因提出了另一种分析的RC4流密码。

46. They use a highly efficient symmetric cipher for the rest of their communication.

在余下的通信中,它们使用高效的对称口令。

47. In the four parallel processing models of the block cipher except the ECB model, there exists iteration with feedback, which is an obstruction of parallel data processing.

在分组密码的四种标准工作模式中,除ECB模式外,其余工作模式均存在着反馈形式的迭代,这对数据的并行操作是一大障碍.

48. In cryptography, a product cipher developed by IBM that formed the basis of DES. It used 128-bit data blocks and a 128-bit key.

在密码学中,由IBM公司开发的一种乘积密码,后成为DES的基础,它使用128位数据块和一个128位的密钥。

49. In cryptography, the additional characters added to a plaintext message, to ensure that its length is an integral number of blocks for encryption by a block cipher.

在密码学中,为了使明文信息的长度为分组密码加密中所用的块的整数倍,而在明文中添加的附加字符。

50. In Germany, the cipher battle continued with B-Dienst, the German code-breaking division breaking the British “Naval Cipher No. 3”.

在德国,B部门继续进行着密码战,德国密码破译部门破译了英国的“海军3号密码”。

51. On receipt of direct tested telex claim, verification of the test number should be carried out per with the test cipher key provided by the sending bank.

在收到直接验证的电传索赔后,应根据发电银行提供的验证密钥对验证密码进行核实。

52. I was a cipher in this company.

在这群人中,我是一个微不足道的小角色。

53. The block cipher mode encodes data one block at a time.

块密码模式一次一块对数据进行编码。

54. Block cipher algorithms encrypt data in block units, rather than a single byte at a time.

块密码算法以块为单位加密数据,而不是逐个字节地加密数据。

55. Based on the encryption principle of affine cipher, a frequency transition function of DFH is designed.

基于仿射密码的加密原理,构造了一种差分跳频的频转移函数。

56. In this paper, through DBMS CRYPTO, the authers introduce a general database encryption package CIPHER, based on an application example.

基于具体应用实例,介绍了利用DBMS_CRYPTO设计的一个数据库加密程序包CIPHER。

57. Cipher Computing based on distributed (Grid) architecture is one of the Important applications.

基于分布式(网格)的密码学计算就是这其中的一个重要应用。

58. If you have duplicate blocks within your plain text stream, you will have duplicate blocks within your cipher text stream.

如果在明文流中有重复的块,那么在密文流中将存在重复的块。

59. If a bit in the cipher text is mangled, one plain text bit is mangled and the shift register is corrupted.

如果密码文本中有一个位出错,则一个纯文本位出错,并且移位寄存器损坏。

60. If a bit in the cipher text is mangled, the corresponding bit of plain text will be mangled.

如果密码文本中有一个位出错,纯文本中相应的位也将出错。

61. If a single bit of the cipher text block is mangled, the entire corresponding plain text block will also be mangled.

如果密码文本块中有一个位出错,相应的整个纯文本块也将出错。

62. If a single bit of the cipher text block is mangled, the corresponding plain text block will also be mangled.

如果密码文本块中有一个位出错,相应的纯文本块也将出错。

63. If you do not select at least one cipher, SSLv2 will not work.

如果您没有至少选择一个加密算法,SSL版本2将不工作。

64. If text is encrypted with a weak key, encrypting the resulting cipher again with the same weak key returns the original text.

如果文本是用弱密钥加密的,则使用同一弱密钥再次加密所得到的密码将会返回原始文本。

65. Given that a specific cipher has no major design flaws, key length is the primary determinant of security.

如果某个加密算法没有大的设计缺陷,那么密钥长度就是安全性的决定因素。

66. The strong data encryption is done by the 256 bit BLOWFISH block cipher (one of the most secure and fastest encryption algorithm) and SHA1 secure hashing algorithm.

存储数据的密码采用256位BLOWFISH密码(一种最安全,最快速的密码算法)和SHA1安全算法。

67. It accepts a Base 64 encoded cipher byte array, and decodes and decrypts it to return the clear data string.

它接受用Base 64编码的密码字节数组,并对它译码和解密以返回明文数据字符串。

68. Cryptograph: a system of secret or cipher writing; a cipher.

密码:一种秘密的或用密码书写的系统;密码。

69. A system of secret or cipher writing; a cipher.

密码一种秘密的或用密码书写的系统;密码

70. In cryptography, an early example of monoalphabetic, or substitution cipher used in the Gallic wars.

密码学中,在高卢战争中使用的一种单表置换密码,或称替代密码的早期例子。

71. In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers.

密码学中,由替代密码和置换密码结合使用而构成的一种密码。

72. Cryptologist Bruce Schneier designed the hand cipher "Solitaire" for Neal Stephenson's book "Cryptonomicon".

密码学家布鲁斯为尼尔史蒂芬森的着作“Cryptonomicon”设计手密码“纸牌游戏”。

73. The cryptographer would break the cipher, the amateur would make a change to "fix" it, and the cryptographer would break it again.

密码学家攻破他的密码,他又会做些改变来“修正”它,密码学家又再次攻破它。

74. A piece of writing in code or cipher.

密码文,电码文一种密码或电码的书写形式

75. A table, gloss, or cipher for decoding or interpreting.

密码本、索引用于破译或解释的表格、词表或索引

76. The cipher's strength is not in its design;anyone could design something like that.The strength is in its analysis.

密码的强度不在于其设计,任何人都可以设计类似的东西,它的强度在于分析。

77. A differential cryptanalysis of the iterated block cipher based on the new round function is presented.

对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。

78. To her employers she was a mere cipher, with no human feelings at all.

对老板来说,她只不过是一个根本没有喜怒哀乐的无名小卒而已。

79. Firstly, we design a binary image watermarking signal and encrypted it by a chaotic sequence cipher before it is embedded.

将含有版权信息的二值图像作为水印,利用混沌密码对其进行加密,水印方案具有双重的安全性。

80. The process of transforming cipher text into plain text.

将密文转换成明文的过程。

英语宝典
考试词汇表