Then analyzing based on the format of data transmission, encryption-decryption basic algorithm and work mode, algorithm is realized by software.
随后在分析理解数据传输格式、具体的加解密算法和工作模式的基础上,通过软件进行了算法的实现。
Based on the importance of P transform and coherence in encryption-decryption in the S-P networks, we put forward the definition of involution-typed mixcolumn transform.
基于S-P网络中P置换的重要性和加解密的一致性,本文提出了对合型列混合变换的概念,并对其代数结构、枝数和计数问题进行了深入地研究和分析。
The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.
离线策略控制备份和恢复命令,以及数据库备份映像的加密和解密。
Handlers can manage encryption and decryption, logging and auditing, and so on.
处理程序可以处理加密和解密、日志记录和审计等。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This section concludes by putting together all the concepts of signature, verification, encryption, and decryption in secure XML messaging applications.
本节总结了安全XML消息传递应用程序中签名、验证、加密和解密等全部概念。
The most expensive operations in terms of performance are usually the serialization and deserialization of the data and return values, and the encryption and decryption of the request and response.
从性能而言,开销最大的操作通常是数据和返回值的序列化和反序列化以及请求和响应的加密与解密。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
Keys are used for digitally signing documents and verifying signatures, and they help with the encryption and decryption processes.
密钥用于数字签署文档和验证签名,也用于加密和解密过程。
A mismatch in either the encryption key or key version number causes the decryption process to fail.
加密密匙或密匙版本号的不匹配会导致解密过程失败。
Encryption and decryption with PHP.
使用PHP进行加密和解密。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
tmp/CalendarCrypt.pl is a Perl program described in a later section that handles the encryption, decryption, and secure delete functions.
tmp/CalendarCrypt.pl是一个Perl程序(将在后面介绍),它处理加密、解密和安全删除函数。
We'll demonstrate the working of encryption and decryption classes and their interaction with parsing logic, and present applications of XML encryption in Web services.
我们将演示加密和解密类的工作方式以及它们使用解析逻辑的交互,并展示Web服务中xml加密的应用程序。
Multiply them to get "n = p*q." Next, you pick a small public exponent "e" which is the "encryption exponent" and a specially crafted inverse of "e" called "d" as the "decryption exponent."
接下来,取一个较小的“e”作为指数,它用作“加密指数”,而对e的进行特殊的逆反函数计算所得到的“d”作为“解密指数”。
You can also use AES_ENCRYPT and AES_DECRYPT functions for encryption and decryption of column data.
还可以使用AES_ENCRYPT和AES_DECRYPT函数对列数据进行加密和解密。
If you can't read the data when you have accessed it, the decryption keys are corrupted, or the server rejects it because the vendor is using its own encryption algorithm.
如果试图访问数据时无法读取数据,原因之一是解密密钥无效,原因之二是遭服务器拒绝,因为此提供商使用的是自己的加密算法。
The same key is used for both encryption and decryption.
加密和解密使用相同的密钥。
All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.
XML加密标记中存在着解密需要的所有信息:加密算法的名称、加密的数据类型以及加密密钥的名称。
Though symmetric keys have their disadvantages (primary among them being how to pass them among the trusted parties), the major advantage they offer is speed of encryption and decryption.
尽管对称密钥有自身的缺陷(主要是如何在互信的双方之间传递),它们最大的优点是加密解密的速度快。
The pass phrase is used only for client-side encryption and decryption of your browser data.
该短语仅用于客户端的浏览器数据加解密。
In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.
根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。
Can be achieved document encryption and decryption.
可以实现文件的加密和解密。
Transparent database encryption refers to the encryption and decryption of data in the database, the database access program is completely unaware.
数据库透明加密是指对库内数据的加密和解密,对数据库的访问程序是完全无感知的。
This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.
这个SQLServer版本内建有加密/解密,这样您就不用去修改您的应用代码。
This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.
这个SQLServer版本内建有加密/解密,这样您就不用去修改您的应用代码。
应用推荐