1、

Version 3 uses a digital signature to sign cryptographic keys and messages.

版本3使用数字签名来签署加密密钥和消息.

2、

Electronic warfare, such as radio-electronic or cryptographic means.

电子战.诸如无线电电子战或各种密码手段.

互联网摘选

3、

Side-channel attacks are serious practical threat against implementation of cryptographic algorithms.

边信道攻击是一种对密码算法实现的有效的攻击.

互联网摘选

4、

Describes how to create a cryptographic key pair for signing an assembly.

描述如何创建用于对程序集签名的密钥对.

互联网摘选

5、

All cryptographic keys will be deleted and should be exported before continuing.

所有密钥将被删除,在继续前应导出.

互联网摘选

6、

Certificate Services is generating the cryptographic key and setting key protection.

证书服务正在生成加密密钥并设置密钥保护.

互联网摘选

7、

And it is very much helpful to the development of cryptographic products.

从而对于开发、研制各种密码产品将起到很大的辅助作用.

互联网摘选

8、

The cryptographic providers you can use for your certificate are listed below.

下表是证书可以使用的加密提供程序.

互联网摘选

9、

The password information is stored in your computer's cryptographic storage database.

密码信息存储在计算机的加密存储数据库中.

互联网摘选

10、

Cryptographic attack based on trapdoor is presented, examples are given.

提出了一种基于陷门的密码攻击方法, 并给出了几个例子.

网络文摘精选

11、

A cryptographic service provider could not be found for this algorithm.

未能找到此算法的加密服务提供程序.

网络文摘精选

12、

This will replace the FIPS-ZZ 40-ZZ cryptographic module with the Netscape internal module.

这将把FIPS -ZZ40-ZZ 加密模块替换成Netscape内部模块.

互联网摘选

13、

CSP is the most generally cryptographic interface of PKI.

CSP是目前应用最广泛的PKI密码 接口.

互联网摘选

14、

It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

密码技术主要包括对称密码算法和非对称密码算法及协议.

互联网摘选

15、

The study of techniques for deciphering cryptographic writings or systems.

研究译解密码书写或密码系统技巧的学科.

互联网摘选

16、

Module ( TPM ) is a hardware device that is basically a secure micro-controller with added cryptographic functionalities.

是一种基于内嵌了加密功能的安全控制器的硬件设备.

互联网摘选

17、

The cryptographic operation failed due to a local security option setting.

加密操作已经失败,因为有本地安全选项设置。

provided by jukuu

18、

In this tutorial you have learned how to capture and read a secure HTTP communication between two systems. You have seen how to generate the required cryptographic artifacts and then how to configure Tomcat and Wireshark to use them correctly.

在本教程中,您学习了如何捕获和读取两个系统间的安全HTTP通信,了解了如何生成一个必需的密码工件以及如何配置Wireshark和Tomcat来正确使用它们。

互联网摘选

19、

This confirms that you have carried out all the cryptographic manipulation steps and Wireshark configuration steps correctly.

这表明您已经正确完成了所有加密操作步骤和Wireshark配置步骤。

互联网摘选

20、

Affine inverse functions derived from the inverse function composed with affine permutations possess good cryptographic properties.

有限域上的逆函数左右复合一个仿射置换而成的仿射逆函数具有很好的密码学性质。

互联网摘选

  • 今日热词
  • 热门搜索

简答网英语词典(dict.jiandongshicai.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:(如需回复请填写联系方式)
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈