Block ciphers use the same encryption algorithm for each block.
块密码对每个块使用相同的加密算法。
The writers often put their results in ciphers or anagrams.
写信人常常把成果写成密码或者搞成字谜。
Digital chaotic ciphers and applications
数字混沌密码及其应用
The selection of the first - born of the millennium may be as arbitrary as any fortunes of birth - ask a family in Tonga - but the chosen are not ciphers.
千禧第一婴儿的挑选可能和任何天生的运气一样带有任意性-问问汤加的一个家庭-但是选出的并非不重要的人。
Typically, secretkey algorithms, called block ciphers, are used to encrypt one block of data at a time.
通常, 私钥算法用于一次加密一个数据块。
Block ciphers with long keys are stronger than stream ciphers.
使用长密钥的块密码比流密码更强。
However, block cipher algorithms tend to execute more slowly than stream ciphers.
但是, 块密码算法执行起来通常比流密码慢。
In data security, the science and study of methods of breaking ciphers.
在数据安全领域中,对破译密码的方法进行研究的一门学科。
A device for deciphering codes and ciphers.
译解电码或密码的装置。
The ciphers unlocked the whole letter.
解密码得方法使整封信得意义得到说明。
Weak keys are keys that result in ciphers that are easy to break.
弱密钥是所生成的密码容易被破解的密钥。
REFORM MH PUBLIC KEY CIPHERS BASED ON BAG QUESTION AND RESEARCH ON ITS DATA EXPANDING RATE
背包公钥密码的改进及其膨胀性研究
Semiweak keys are pairs of keys that result in ciphers that are easy to break.
半弱密钥是产生的密码容易被破解的密钥对。
The document encrypts and deciphers
文件加密与解密
Is it enough to break the Enigma ciphers used by Nazi Germany in the Second World War
破解二战时德国纳粹使用的谜机密码就够了吗?
The construction of feedforward network against attacks in stream ciphers is studied in this paper.
研究了流密码体制中抗攻击前馈网络的构造。
Deceptive analysis in attacking a kind of knapsack cipherssystems based on genetic algorithms
对一类背包密码体制攻击中的遗传算法欺骗性分析
英文例句大全为您提供ciphers英文例句大全,ciphers英文造句,关于ciphers的英语句子,单词ciphers怎么造句,ciphers英文例句大全有哪些,哪些英语句子是关于ciphers,英语单词ciphers的句子,单词ciphers如何造句,ciphers怎么造句等。