• The number that you choose to rotate your letters by is what we call in cryptography, a key.

    选择旋转字母数量就是我们密码学所说的密匙。

    youdao

  • There's cryptography going on.

    这里使用了密码技术

    youdao

  • Appendix 4: Public-key cryptography terminology.

    附录4公钥加密术语

    youdao

  • Digital signatures rely on public key cryptography.

    数字签名依赖公共密钥加密学

    youdao

  • Computing: Quantum cryptography is unbreakable in theory.

    计算量子密码理论上无法破解的。

    youdao

  • RSA public-key cryptography is based on this property of factorization.

    RSA公钥密码系统就是基于这种因数分解特性

    youdao

  • Note: See Resources for more information about cryptography in OpenBSD.

    注意有关OpenBSD加密方面更多信息请参见参考资料部分。

    youdao

  • All the clever cryptography means BitCoin dealings are difficult to trace.

    所有聪明密码学家表示跟踪比特币交易困难。

    youdao

  • The articles on cryptography do contain a great deal of mathematical depth.

    关于加密算法文章确实包含很多高深数学逻辑。

    youdao

  • Cryptography is the art of "secret writing," as the word's Greek roots attest.

    作为希腊的词根资产,加密技术一种“神秘编写艺术

    youdao

  • Since a pair of keys is involved, it is also called an asymmetric cryptography.

    因为涉及到一对密钥所以它称为对称加密。

    youdao

  • This is the primary differentiating factor amongst the cryptography algorithms.

    区分加密算法根本

    youdao

  • Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).

    不对称加密公钥加密(两个术语同义词)。

    youdao

  • There are also control challenges here, including those related to cryptography use.

    这里还有一些控制上的问题其中一些与应用加密有关

    youdao

  • To request a certificate, you need to generate a keypair using cryptography software.

    请求证书,需要使用加密软件生成一个密钥对

    youdao

  • A digital certificate is more than just a cryptography key; it is an online credential.

    数字证书不仅仅加密密钥还是在线凭证

    youdao

  • You can use Shiro's cryptography support anywhere, even if a Subject is not being used.

    可以在任何地方使用Shiro加密支持甚至使用Subject的情况下。

    youdao

  • Shiro’s goal in cryptography is to simplify and make usable the JDK’s cryptography support.

    加密方面,Shiro的目标简化JDK的加密支持可用

    youdao

  • Cryptography is the process of hiding or obfuscating data so prying eyes can't understand it.

    加密隐藏混淆数据避免被偷窥过程

    youdao

  • And their fears are not groundless: More than 90% of proprietary cryptography has been broken.

    他们的害怕并非没有根据:90%以上专用密码术都已攻破

    youdao

  • Secret key cryptography is one of the most important technologies in distributed systems security.

    秘密密钥加密分布式系统安全机制中一重要技术

    youdao

  • Kerberos was designed based on secret key cryptography and using trusted third party authentication.

    Kerberos根据秘密密钥加密使用可信第三身份验证而设计的。

    youdao

  • However, public key Cryptography takes things a step further and introduces the idea of signed public keys.

    然而公钥密码术更进一步,它引入签名公钥概念

    youdao

  • Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.

    算法类型定义加密算法对称的、非对称还是消息摘要。

    youdao

  • In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider.

    这个演示中使用SunJCE密码术供应商tripledes加密算法

    youdao

  • The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.

    加密过程解密过程一般称作密码术依赖数学算法

    youdao

  • There are subtle issues of cryptography, replay attacks, and various other forms of attack that are easily overlooked.

    加密重播攻击其中各种形式攻击各种细微问题容易被忽视

    youdao

  • For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.

    例如核心层加密技术更改要求加密控制进行更改,反之亦然。

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定