Scheme of Image Encryption Based on Fresnel Digital Holography
基于菲涅尔数字全息的图像加密方法
Magic cube encryption for digital image using chaotic sequence
用混沌序列对数字图像进行魔方加密
Block ciphers use the same encryption algorithm for each block.
块密码对每个块使用相同的加密算法。
In this article, we focus on encryption and digital signatures.
本文中我们主要讨论加密和数字签名。
And the reason it does is not because of the clever encryption.
一定会送到的原因不是这个聪明的加密系统。
The funtion of MAC module is media access control and encryption.
媒体控制模块提供媒体访问控制和加密机制。
Provides a symmetric encryption algorithm to encrypt message text.
提供对称加密算法来加密消息文本。
Property contains the encryption algorithm used by the connection.
属性包含连接使用的加密算法。
This wholevalue substitution attack bypasses encryption altogether.
这种整个值替换攻击可以完全绕过加密。
Research on Chaos Based Image Encryption and Watermarking Technology
基于混沌的图像加密与数字水印技术研究
The longer the key, the more difficult to break the encryption code.
密钥越长,密码就越难以破解。
What was the encryption type requested during authentication handshake
在身份验证握手期间请求的加密类型
Design of a Speech Secure Communication Software with Chaos Encryption
实时语音混沌保密通信软件设计
The longer the key the more difficult is to break the encryption code.
密钥越长, 密码就越难以破解。
Study of Public Key Encryption Secure Against Chosen Ciphertext Attacks
抗选择密文攻击公钥密码体制的研究
Securely stores encryption keys for encrypted communication and signing.
安全储存的加密金钥加密的沟通和签署。
This property specifies which certificate to use for outbound encryption.
此属性指定哪个证书将用于出站加密。
It is also possible to use block analysis to determine the encryption key.
另外, 还可以使用块分析来确定加密密钥。
Research on End to End Encryption Terminal in Mobile Communications System
基于移动通信网的端到端加密终端研究与实现
AES the US Government standard symmetric encryption algorithm and Blowfish.
生成自解密可执行文件友好的用户界面等。
This paper discusses a algorithm of file encryption based on random factor.
本文提出一种基于随机码数列得文件加密算法。
Using a brute force attack, can you decrypt the cipher using XOR encryption
题目简介使用暴力破解一段使用异或方式加密的英文文本。
After encryption and decipher the guarantee obtains the data is consistent.
经过加密和解密后保证得到的数据是一致的。
An Image Encryption Algorithm Based on Chaotic System and Polarized Identity
基于混沌系统和极化恒等式的数字图像加密算法
In order to encrypt and decrypt, you need an encryption algorithm and a key.
为了进行加密和解密,您需要加密算法和密钥。
英文例句大全为您提供encryption英文例句大全,encryption英文造句,关于encryption的英语句子,单词encryption怎么造句,encryption英文例句大全有哪些,哪些英语句子是关于encryption,英语单词encryption的句子,单词encryption如何造句,encryption怎么造句等。