cryptographic
推荐文章

adj. 关于暗号的,用密码写的
adj.
关于暗号的,用密码写的;
英英释义
cryptographic[ ,kriptə'ɡræfik ]
adj.of or relating to cryptanalysis
同义词:cryptanalyticcryptographicalcryptologiccryptological
词组短语
cryptographic key密钥;密码关键字
cryptographic algorithm密码算法
双语例句
In communications, a cryptographic technique where the sequence of characters or bits is changed by means of a secret transformation.
通信中的一种加密技术。它用保密转换的方法改变字符或二进制位。同cryptography。
One who uses, studies, or develops cryptographic systems and writings.
加密员使用、研究或改进密码系统和密码书写的人
The analysis and deciphering of cryptographic writings or systems.
密码分析对密码书写或密码系统的分析和译解
A cryptographic system in which units of plain text of regular length, usually letters, are arbitrarily transposed or substituted according to a predetermined code.
密码一种密码系统,其中固定长度的明文里的单元,通常为字母,被任意倒置或按事先确定的符号系统替换
权威例句
Cryptographic Cloud StorageCryptographic communications system and method
Cryptographic communications system and method
On the Importance of Checking Cryptographic
Trapdoors for hard lattices and new cryptographic constructions
Trapdoors for hard lattices and new cryptographic constructions.
Completeness theorems for non-cryptographic fault-tolerant distributed computation
Complete - ness theorems for non - cryptographic fault - tolerant distributed computating
How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions
Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theor...
1. As with any cryptographic keys, these should be changed periodically.
与任何密码术密钥一样,应该定期改变这些密钥。
www.ibm.com
2. A credential can be anything from simple password to a complex cryptographic key.
凭证可以是从简单的密码到复杂的加密密钥的任何东西。
www.ibm.com
3. This requires that a certificate for the externally visible hostname be stored in a Cryptographic Message Syntax (CMS) key database file.
这要求将外部可见的主机名的凭证存储在一个CryptographicMessageSyntax (CMS)密钥数据库文件中。
www.ibm.com
4. This is a cryptographic protocol that takes as its inputs, among others, any attributes to be encoded into the token.
这是在一部分输入和属性需要编码到令牌中的时候所要采用的加密协议。
www.infoq.com
5. One of the museum exhibits is this underground magnet antennae from the ‘Bita’ cryptographic hardware.
博物馆的展馆之一,是来自于“碧塔海”加密硬件的地下磁铁天线。
article.yeeyan.org
6. This handshake produces the cryptographic parameters of the session.
此次握手将生成会话的加密参数。
www.ibm.com
7. Isolating the application also provides an added level of security because all cryptographic information stays within the device.
应用程序的隔离还提供了添加的安全性层,因为所有的密码信息驻留在设备里。
www.ibm.com
8. There may be cryptographic techniques, skill level of vendors’ staff to ensure the security and some new methods may be devised to solve this issue.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。 同时,可以设计一些新的方法,解决这个问题。。
article.yeeyan.org
9. The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase.
然后,开发的签名将被转换为密码散列并存储到磁盘中,以供稍后在监视阶段中进行比较。
www.ibm.com
10. Moreover, the cryptographic mode will offer India a first national secure identification capability for protecting its own assets.
此外,加密模块将为印度提供第一个国家安全识别能力以保护自己的资产。
www.etiri.com.cn
11. It includes requirements as they relate to the signature syntax, data model, format, cryptographic processing, and external requirements and coordination.
它包括涉及签名语法、资料模型、格式、密码处理方面的要求,以及外部要求和协调。
www.ibm.com
12. We will now try to form a strategy for cryptographic support.
现在我们将尝试形成一个用于密码支持的策略。
www.ibm.com
13. Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
www.ibm.com
14. If the device only performs a simple cryptographic function, all of the objects must be managed by the software.
如果设备只执行简单的密码功能,则所有对象必须由软件来管理。
www.ibm.com
15. The primary principle of JCA design is to separate cryptographic concepts from algorithmic implementations, so that different vendors can offer their tools within the JCA framework.
JCA设计的主要原理是将密码概念从算法实现中分离出来,以便不同的供应商可以在JCA框架内提供他们的工具。
www.ibm.com
16. We need to implement cryptographic functionality as well.
我们还需要实现密码功能。
www.ibm.com
17. This allows a long running exchange to use symmetric cryptographic operations to protect the messages during an established session.
这允许一个长时间运行的会话使用对称密码操作在一个已建立的会话期间保护消息。
www.ibm.com
18. For SSO to function properly, all servers must agree on cryptographic keys, user information, and miscellaneous other configuration data.
为了让SSO正常工作,所有服务器必须同意密钥、用户信息和各种其他配置数据。
www.ibm.com
19. Finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographic key.
最后是强身份验证,其中使用两种或者更多的方法对一个标识进行验证,如密码和加密密钥。
www.ibm.com
20. You can even specify in a trusted context definition that a requester must communicate with DB2 using the Secure Sockets Layer (SSL) cryptographic protocol.
您甚至可以在可信上下文定义中指定,请求者必须使用安全套接字层 (SSL)加密协议与DB2通信。
www.ibm.com
21. As mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity.
正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。
www.ibm.com
22. This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用ACF提供的硬件密码计算加速设施。
www.ibm.com
23. These rules specify the order in which messages are sent, the format of each message, and the way cryptographic algorithms are applied to network communications.
这些规则指定消息发送的顺序、每条消息的格式以及对网络通信应用加密算法的方式。
www.ibm.com
24. It is important to note that the procedures followed here and some of the cryptographic artifacts generated here are very insecure and should never be applied to a production environment.
需要重点指出的是,随后的过程和在此生成的部分加密工件是非常不安全的,所以一定不能应用于生产环境中。
www.ibm.com
25. Ravi and his colleague Kevin Knight treat translation as a cryptographic problem, as if the foreign text were simply English written in an advanced cipher.
拉维和他的同事凯文·奈特把翻译当做加密问题,好像外国文字也是用英文书写,只不过使用了某种高级的加密方式。
article.yeeyan.org
26. This flexibility allows the STDLLs to support any cryptographic device.
这种灵活性使得STDLL可以支持任何密码设备。
www.ibm.com
27. The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.
SSL中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。
www.ibm.com
28. A hash is the result of a cryptographic function that takes an arbitrarily sized string of data, performs a mathematical encryption function on it, and returns a fixed-size string.
哈希是一种加密功能所获得的结果,这种加密需要获取任意大小的字符串数据,并用算法对其进行加密,然后返回一个固定大小的字符串。
article.yeeyan.org
29. Hackers can go further by finding out the latest version of cryptographic algorithms and then on their own machines do reverse-engineering to learn how the algorithms work.
黑客还可以查明密码算法的最新版本,然后在自己的计算机上执行反向工程以了解算法的工作过程。
www.ibm.com
30. InfoQ - How far are we from quantum computing solutions to some of the cryptographic issues raised in the Intel Technology Journal?
现实中我们离因特尔的技术中所提出的运用量子计算的方法来解决一些加密的问题还有多远的距离?
www.infoq.com
31. A cryptographic system in which units of plain text of regular length, usually letters, are arbitrarily transposed or substituted according to a predetermined code.
密码一种密码系统,其中固定长度的明文里的单元,通常为字母,被任意倒置或按事先确定的符号系统替换
-- 来源 -- 英汉 - 短句参考
32. In the Programmed Cryptographic Facility, a concept where only a limited number of clear ( unenciphered ) cryptographic keys exist within the cryptographic facility.
在程控密码装置中使用的一项法则,在密码装置里只能有限量的明文密钥(未译成密码的密码关键字)存在。
-- 来源 -- 英汉 - 辞典例句
33. In the Programmed Cryptographic Facility, a non-VSAM data set that contains host master key variant 1, host master key variant 2, and the system authentication key.
在程控密码设施中的一种非虚拟存储存取法(VSAM)数据集,其中包含有主机主密钥第一变形、第二变形及系统鉴别密钥。
-- 来源 -- 英汉 - 辞典例句
34. cryptographic algorithm
密码算法
-- 来源 -- 英汉 - 翻译参考[网络]
35. The study of techniques for deciphering cryptographic writings or systems.
研究译解密码书写或密码系统技巧的学科.
-- 来源 -- 英汉 - 翻译样例
36. cryptanalysis:The analysis and deciphering of cryptographic writings or systems.
密码分析:对密码书写或密码系统的分析和译解.
-- 来源 -- 英汉 - 翻译样例
37. Electronic warfare, such as radio-electronic or cryptographic means.
电子战, 诸如无线电电子战或各种密码手段。
-- 来源 -- 汉英 - 翻译参考
38. cryptographic adj.
关于暗号的;用密码写的
-- 来源 -- 英汉 - 翻译参考[网络]
39. The analysis and deciphering of cryptographic writings or systems.
密码分析对密码书写或密码系统的分析和译解
-- 来源 -- 英汉 - 短句参考
40. cryptographic center
密码中心
-- 来源 -- 英汉 - 翻译参考[网络]
cryptographic




