ciphertext

ciphertext

1. Bible:A Ciphertext of Western Literature

《圣经》:西方文学的巨大密码

2. Proving the Security of an Encryption Scheme under the Chosen Ciphertext Attacks

一个加密方案的选择密文安全性的证明

3. A New Chosen Ciphertext Secure ID-Based Threshold Decryption Scheme from Pairing

一种新的基于身份选择密文安全的门限解密方案

4. A method for hiding ciphertext in the noisy stream

一种随机噪声中的密文隐藏方法

5. The following is a notation for relating plaintext, ciphertext, and keys.

下面是有关明文、密文和密钥关系的表示法。

6. That is, they take a plaintext string, and transform it into a small piece of ciphertext that cannot be used to reconstruct the original plaintext.

也就是说,它们接收一个明码字串,将它转换成一小段无法用来重建原始明码的密文。

7. The following example decrypts ciphertext by using a symmetric key.

以下示例使用对称密钥对密码进行解密。

8. By using the ciphertext, messages can avoid being stolen and modified by hackers.

以密文传送可以避免资料被窃取后遭到窜改;

9. It does not matter that Eve also knows Bob's PK because she cannot use it to decrypt the ciphertext.

伊芙也知道鲍伯的公钥,但是没关系,因为公钥无法用来解开密文。

10. Using this key, which has an algorithm of "shift the letters forward by three," the word "help" in plaintext would be encrypted to be "khos" as ciphertext.

使用此密钥(采用“将字母前移三位”的算法),纯文本中的单词“help”将加密为“khos”密码。

11. For example, in ECB mode, encrypting identical blocks of plaintext always produces identical blocks of ciphertext, facilitating certain kinds of cryptanalytic attacks.

例如,在ECB模式中,对相同明文块的加密总是产生相同的密文块,这为某些类型的密码分析攻击打开了方便之门。

12. Keywords public key cryptosystem;chosen ciphertext security;identity based encryption;threshold encryption;

公钥密码系统;选择密文安全性;基于身份加密;门限加密;

13. Function could potentially contain any binary character, it is possible to return a ciphertext containing a system delimiter where one did not previously exist.

函数返回的字符串可能包含二进制字符,所以可能返回包含系统定界字符的密文,而这个定界字符之前是不存在的。

14. Encryption can be defined as the process of tasking information that exists in some readable form (plaintext) and converting it into a form (ciphertext) so that it cannot be understood by others.

加密可以定义为把现有的、以某种可读形式(明文)的信息转换成其他人不能理解的形式(密文)的过程。

15. Method of encryption text (concealing its readability and meaning). It is also sometimes used to refer to the encrypted text message itself although here the term ciphertext is preferred.

加密文本的方法(掩盖其含义和可读性)。有时也指加密的文本信息本身,尽管这里主要指加密文本。

16. The purpose of encryption is to prevent unauthorized viewers from reading sensitive information, even if they have access to the ciphertext.

加密的目的是使未经授权的查看者即使可以访问到密文,也不能读到敏感信息。

17. This seed is encrypted, and the result is combined with a block of plaintext to produce the ciphertext.

加密种子后,将加密结果与明文块结合产生密文。

18. Encrypted , be with the process being called read information change "proclaimed in writing" becoming "ciphertext ".

加密,就是把称为“明文”的可读信息转换成“密文”的过程。

19. Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption

单双钥混合体制的选择密文安全性

20. Although the ciphertext message was stolen by the hacker, it cannot be decrypted without the right key.

即使资料窃取,也只有拥有此金钥的使用者才能够解开此密文。

21. "Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext."

反过来,解密则是将密码文件重新转变成其原始文件形式的方法。

22. VARIATIONS IN VARIATIONS, INSEPARABLE LINKS AND ENCRYPTING WITHOUT DISCIPLINE--THE DESIGNING THOUGHT OF THE "CHAMELEON" CIPHERTEXT SYSTEM

变中有变,环环相扣,随动加密--"变色龙"密文系统的设计思想

23. The ciphertext can only be decrypted with the corresponding private key.

只能使用相应的私钥对加密文本进行解密。

24. Encryption alone may not be sufficient to protect against this type of attack, since an opponent could simply replay previous ciphertext.

因此,单靠电文密码并不能完全保证不被窃取,因为敌手可以简单地重放已记录下的先前的密码电文。

25. Based on ciphertext index and aiming at practical application on encrypted database,the paper designs a new ciphertext index by combining binary tree ciphertext index with B+ tree index.

在密文索引的基础上,针对实际密文数据库的应用,将二叉树密文索引和B+树索引相结合,设计了一种新的密文索引,并介绍了其查询方法,分析了其查询效率及安全性

26. In the proposed scheme, only the designated recipient could recover the group signcrypted plain message from the ciphertext to verify the validity of the group signcryption.

在提出的方案中,只有指定接收者可以从群签密密文恢复出被群签密消息的明文来验证群签密的有效性;

27. The line feed characters should be placed back in the ciphertext string before decoding and decrypting the data to avoid errors.

在解码和解密数据之前,应该将换行字符放回密文中,以避免出现错误。

28. In the context of message security, plaintext is used to differentiate from ciphertext to indicate that the text is not encrypted.

在讨论邮件安全性的上下文中,纯文本用于区别密码,以指出该文本未加密。

29. Efficient Chosen Ciphertext Secure Public Key Cryptosystem from the ID-Based Encryption of Waters

基于Waters的ID加密的高效选择密文安全公钥密码体制

30. Encryption theory of multi-plaintext and sole ciphertext

多明文-单密文的加密技术构思

31. How to check the security of a scheme, which is adaptive chosen ciphertext secure in the random oracle model, in the real world is an open problem of the provable security research field.

如何判断随机预言机模型下适应性选择密文安全的方案在真实世界中的安全性,是可证明安全领域一个有待解决的问题。

32. If an authenticator was included when the ciphertext was encrypted, the authenticator must be provided at decryption time.

如果对加密文本进行解密时包括验证器,则必须在解密时提供该验证器。

33. Chosen ciphertext attack

安全性分析

34. Showing a full operation means that plaintext would have to be encrypted to ciphertext using a private key and then decrypted back to plaintext using the corresponding public key.

完整的操作意味着必须使用私钥将纯文本加密成密码,然后使用对应的公钥将密码重新解密成纯文本。

35. binary tree ciphertext index

密文二叉树索引

36. ciphertext analysis

密文分析

37. ciphertext block feedback

密文分组反馈

38. ciphertext block data

密文块数据

39. ciphertext stealing

密文失窃

40. query on ciphertext

密文检索

41. Ciphertext Auto Key

密文自动密钥

42. The Ciphertext System and the Methods of Encryption Communication Comparing and Research

密码体制及加密传输方式比较研究

43. ciphertext block attack

密码分组破译

44. The relationship between the key and the ciphertext as complex and involved as possible.

密钥与密文之间关系尽可能的复杂。

45. Thirdly, if all keys are verified right, but the user still could not decrypt, then, something must be wrong with the ciphertext or the attributes.

当密钥通过验证,而解密依然出错,说明是加密过程中或者密文跟随的消息属性出了问题,不会出现无法判断哪里出错的情况。

46. We want the input to the function to also be partof the plaintext in the encryption and part of the ciphertext in the decryption.

当我们在线购物时,我们需要确保出售方是真实的。当我们把交易请求发送给银行时,我们还要保证信息的完整性不被破坏。

47. It is also shown that if all the entries of the equivalent plaintext vector are small enough, the equivalent plaintext is the exact plaintext corresponding to the ciphertext.

当该等价明文向量的各个分量都很小时,则此等价明文就是密文所对应的明文。

48. Study of Public Key Encryption Secure Against Chosen Ciphertext Attacks

抗选择密文攻击公钥密码体制的研究

49. The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary.

摘要抗选择密文攻击公钥密码体制是安全性很高的密码体制,它是设计抗主动攻击的协议非常有用的工具。

50. Ciphertext index mechanism for database system

数据库的密文索引机制

51. The new scheme provides integrity of ciphertext and correctness of plaintext by 3 steps, and it keeps confidentiality, fairness and non-repudiation.

新方案通过3个步骤保证消息的完整性和内容的正确性,具有保密性、公平性与非否认性;

52. To achieve thisgoal, divide the plaintext and the ciphertext into two equal-length blocks, left and fight.

本书首先向读者介绍密码学的基本原理,然后应用这些基本原理来说明网络安全协议。

53. Identity-Based Threshold Decryption Schemes Secure against Chosen Ciphertext Attacks in the Standard Model

标准模型下的抗选择密文攻击基于身份门限解密方案

54. Non-interactive Threshold Cryptosystems Secure Against Chosen Ciphertext Attacks in the Standard Model

标准模型中非交互抗选择密文攻击门限密码方案

55. According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.

根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。

56. Depending upon how the index is built, it could hold either the plaintext value of the field or the ciphertext value.

根据索引建立方式的不同,索引中可能包含字段的明文值,也可能包含密文值。

57. There is no body of expertise on how to mimic a long medieval ciphertext, because there are hardly any examples of such texts, let alone hoaxes of this genre.

没有专家研究过如何摹写大段中世纪密文,因为要找到真实文字的实例都不容易,想要找出假造的文字就更难了。

58. Click "Encrypt" button, you can access encrypted ciphertext.

点击“加密”按钮,即可获得加密密文。

59. Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.

现代加密算法必须更为复杂,因为密码文本常用户保护价值数十万或数百万美元计的信息。

60. statistical analysis of ciphertext;

的统计分析密文;

61. Numerical paradigms show that the optimal truncated equal length coding can efficiently shorten the length of ciphertext and obtain more uniform ratio of bit 0 to bit 1.

算例分析表明最优N-截断等长编码可有效缩短密文长度,提高0,1比例的均匀度。

62. The resulting ciphertext is called the signature.

结果密文称为签名。

63. byte[] plainText = dec.Decrypt(cipherText, key);

继续进行解密。

64. If the data to be protected is already encrypted, then authenticity requires that a cryptanalyst would not be able to substitute a false ciphertext without detection.

若待保护的数据已被译成密码,则可靠性要求密码分析员不能代之以伪造的密码电文而不被发现。

65. This cryptosystem can actively protect against the chosen plaintext and the various chosen ciphertext attacks including IND-CCA2 attacks.It achieves the same security like One-Time-Pad.

该安全方案可以主动抵御选择明文攻击与各种选择密文攻击,包括IND-CCA2,并且可以达到类似一次一密的安全效果。

66. It can improve the degradation of digital chaotic and diffusing speed of diffusion function through perturbating initial value of chaotic system with ciphertext.

该算法利用密文扰动混沌系统的初始值,既改善了数字混沌的退化,又能使扩散函数具有非常快的扩散速度。

67. -This code is a cipher which takes in a plaint ext or ciphertext string and encrypts / decrypt 's according to a user defined key value.

详细说明: This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined key value.

68. -Achieve translocation password (Extension Caesar password), use the keyboard to receive explicit and key, screen printing ciphertext.

详细说明: 实现移位密码(扩展凯撒密码),用键盘接收明文和密钥,屏幕打印密文。

69. "Data encryption: Process of disguising information as " ciphertext ,"or data that will be unintelligible to an unauthorized person."

资料加密:将信息伪装成密码文件或使未经许可的人无法识别的资料的方法。

70. Thus, plaintext is now garbled ciphertext .

这样,普通文本就捣弄成了密码文本。

71. This finding indicates that if the Cardan grille was indeed used to make the Voynich manuscript, the author was probably creating cleverly designed nonsense rather than a ciphertext.

这表示,如果制作伏尼契手稿时用的确实是卡丹格板,那麽作者想做的很可能只是巧妙设计的无意义密码,而不是密文。

72. adaptive chosen ciphertext attack

适应性选择密文攻击

73. chosen ciphertext security

选择密文安全性

74. Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.

针对数据库中数据的保密性问题,分析了目前已有的一些加密机制,提出了一种基于密文索引的新的查询方法。

75. According to the adversary's goal and information resource, adaptive chosen ciphertext attacks are classified into four categories and then the possibility of each category of attacks is analyzed.

首先根据攻击者的目的及其能够得到的信息资源将适应性选择密文攻击分为4种模式,然后分析每一种模式存在的可能性。

76. First, let's get a few terms out of the way.In cryptography, a file of any type that isn't encrypted is called plaintext;encrypted data is called ciphertext.

首先,让我们解释几个术语上的拦路虎,在密码学中,没有加密的任何形式的文件都被叫做普通文本,而加密的数据则叫做密码文本。

77. Without breaking the encryption, a hacker can infer significant information from the context in which the ciphertext is stored.

黑客无需进行解密,即可根据存储密文的上下文推断出重要信息。

英语宝典
考试词汇表