• How ciphertext was generated in card reader using DUKPT encryption?

    如何读卡器使用dukpt密文加密生成的?

    youdao

  • Note that there is also a method called ciphertext stealing for CBC.

    注意CBC还有一种称为密文窃取方法

    youdao

  • The following is a notation for relating plaintext, ciphertext, and keys.

    下面有关明文密文密钥关系表示法

    youdao

  • Using a file input and output ciphertext expressly to carry out the test.

    文件输入输出明文密文进行了测试。

    youdao

  • The size of the ciphertext was a constant and independent of the size of the ring.

    密文大小一个常量并且的大小无关

    youdao

  • Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.

    提出两个抗选择密文攻击门限密码系统

    youdao

  • You should make sure that the bytes that make up the ciphertext and keys stay intact.

    应该确保组成密文密钥字节保持不变

    youdao

  • If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.

    如果相同加密两次使用相同密钥由此产生的密文相同的。

    youdao

  • In the random oracle model, the scheme is provably secure against adaptive chosen ciphertext attacks.

    随机预言模型下,方案适应性选择密文攻击下可证明安全的。

    youdao

  • The receiving application then decrypts the message upon receipt, converting from ciphertext back to plain text.

    接着,接收应用程序一接收到消息对其解密密文转换明文

    youdao

  • According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.

    根据加密数据库特点分析了建立密文索引需要考虑主要因素

    youdao

  • Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    由于敏感数据加密,任何直接数据库文件进行分析攻击方式,都只能看到密文。

    youdao

  • By examining the ciphertext, you can use a few heuristic tricks to figure out the plaintext has been shifted two characters.

    通过检查文并借助一些启发式技巧可以知道,明文实际上移动两个字符。

    youdao

  • This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.

    方案认为适应性选择密文攻击实用方案之一缺乏严格的安全性证明。

    youdao

  • If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.

    如果完整的明文对应密文可是实现破译功能得出加密密钥

    youdao

  • Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.

    高密度随机背包困难性假设,可以证明方案在唯密文攻击安全的。

    youdao

  • Now, if you have some message, you just need to interpret its bytes as a number "M." If you want to "encrypt" a message to create a "ciphertext", you'd calculate

    现在如果一些消息,那么你需要该消息的字节翻译成个数M”,这个消息进行“加密形成密文”的话,你就这么计算

    youdao

  • Function could potentially contain any binary character, it is possible to return a ciphertext containing a system delimiter where one did not previously exist.

    函数返回的字符串可能包含二进制字符所以可能返回包含系统定界字符的密文,而这个定界字符之前存在的。

    youdao

  • Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.

    针对数据库数据保密性问题分析了目前已有的一些加密机制提出一种基于密文索引新的查询方法

    youdao

  • The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

    差分功率分析DPA方法有效地加密集成电路芯片进行攻击解密绕过了加解密算法繁琐的数学分析,从而获取密码信息。

    youdao

  • Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.

    现代加密算法必须更为复杂因为密码文本常用户保护价值数十万数百万美元计的信息

    youdao

  • In order to enable query on ciphertext, date and numeric typed data must be transformed according some rules, and the grouping cipher arithmetic must be changed a little.

    为了保证密文数据不解密的情况下能够检索出来,日期数字类型的数据需要按照一定规则转换成字符,并且加密使用的分组密码算法需要进行一些改造。

    youdao

  • A method for hiding ciphertext in the noisy stream is presented, with the ciphertext embedded in a noise stream by a pseudo sequence which is controlled by the noisy stream.

    提出种在随机噪声中的密文隐藏方法方法主要采用噪声控制技术将密文嵌入噪声流中

    youdao

  • Even if other people get your ciphertext, do not say absolutely can not break, but should at least break some of the Chinese through MD5 and then very difficult to restore it.

    即使别人拿到密文不说绝对破解了,但是至少应该破解一些中文经过MD 5还原难度相当吧。

    youdao

  • To use md5 or higher, you can explicitly call the crypt function along with the md5 function both in the plaintext and salt arguments to get a random ciphertext (see Listing 5).

    使用md 5更高版本的salt可以式调用明文salt参数中的crypt函数以及md 5函数,获取随机暗文(参见清单5)。

    youdao

  • To use md5 or higher, you can explicitly call the crypt function along with the md5 function both in the plaintext and salt arguments to get a random ciphertext (see Listing 5).

    使用md 5更高版本的salt可以式调用明文salt参数中的crypt函数以及md 5函数,获取随机暗文(参见清单5)。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定