decryption



n.
解密,译码,密电码回译;
英英释义
decryption[ di:'kripʃən ]
n.the activity of making clear or converting from code into plain text
"a secret key or password is required for decryption"
同义词:decodingdecipherment
权威例句
A new chaotic key-based design for image encryption and decryptionA new chaotic key-based design for image encryption and decryption
Sharing Decryption in the Context of Voting or Lotteries
Secure Scalable Streaming Enabling Transcoding Without Decryption
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption
The influence of noise on optical image encryption & decryption using chaotic phase array
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Outsourcing the decryption of ABE ciphertexts
A method for obtaining digital signatures and public-key cryptosystems
1. Encryption and decryption with PHP.
使用PHP进行加密和解密。
youdao
2. The document is decrypted using the decryption key.
解密密钥会被用来对文档进行解密。
youdao
3. Decryptor is the main object in the decryption process.
Decryptor是解密过程中的主要对象。
youdao
4. The same key is used for both encryption and decryption.
加密和解密使用相同的密钥。
youdao
5. This is the trail that needs to be followed for decryption.
这是解密所需遵循的轨迹。
youdao
6. Decryption Key [request] For decrypting incoming request message.
DecryptionKey [request]用于解密传入的请求消息。
youdao
7. Instead, the other key in the pair must be used for the decryption.
相反,这对密匙值的另外一个密匙必须用于解密。
youdao
8. A Cipher class object is created and initiated in the decryption mode.
这样就用解密方式创建并初始化了cipher类对象。
youdao
9. Using various decryption tools we can identify these three coded phrases.
运用各种解密工具我们确定了这三个密码词语。
youdao
10. Add the code shown below in Listing 11 to complete the decryption process.
添加清单11中的代码,完成解密过程。
youdao
11. In this case, if detection is successful, decryption must also be performed.
在这种情况下,即使侦测成功,也必须执行解密操作。
youdao
12. Handlers can manage encryption and decryption, logging and auditing, and so on.
处理程序可以处理加密和解密、日志记录和审计等。
youdao
13. With regards to performance loss due to the on-demand decryption, Dmitry stated.
关于即需解密而导致的性能损失,Dmitry说到。
youdao
14. When the publisher's end receives an XML-encrypted file, it will need decryption.
出版社一方接收xml加密的文件时,就要对该文件解密。
youdao
15. The underlying provider will take care of all necessary password hashing or decryption.
底层的提供者会处理好必要的密码散列或解密。
youdao
16. Without the proper decryption, the content of the message would just be digital gibberish.
没有正确的解密系统,邮件内容不过是些乱码罢了。
youdao
17. The pass phrase is used only for client-side encryption and decryption of your browser data.
该短语仅用于客户端的浏览器数据加解密。
youdao
18. Decryptor understands XPath expressions in order to identify the XML element for decryption.
为了识别需要解密的xml元素,Decryptor要能理解XPath表达式。
youdao
19. A mismatch in either the encryption key or key version number causes the decryption process to fail.
加密密匙或密匙版本号的不匹配会导致解密过程失败。
youdao
20. You can also use AES_ENCRYPT and AES_DECRYPT functions for encryption and decryption of column data.
还可以使用AES_ENCRYPT和AES_DECRYPT函数对列数据进行加密和解密。
youdao
21. When she wants to download some documents, Alice USES the TG to generate a token and a decryption key.
当她需要下载一些文档的时候,Alice会使用TG来生成一个令牌和一个解密的密钥。
youdao
22. This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.
这个SQLServer版本内建有加密/解密,这样您就不用去修改您的应用代码。
youdao
23. The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
youdao
24. Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
youdao
25. The decryption algorithm no longer could unravel the proper answers, because the answers were drowned in noise.
加密算法无法解密得到正确的答案,因为答案完全被噪声所覆盖。
youdao
26. The string manipulation functions in Listing 13 replace the lost formatting before the decryption command is called.
在调用解密命令之前,清单13中的字符串操作函数将替换丢失的格式。
youdao
27. Before the message is forwarded to the receiver, Facade performs decryption, authorization and authentication on it.
在将消息转发给接收方之前,Facade在其上执行解密、授权和身份验证。
youdao
28. The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.
离线策略控制备份和恢复命令,以及数据库备份映像的加密和解密。
youdao
29. The target server receives the request and passes the deserialized token to the application server for decryption.
目标服务器接收请求,并将反序列化后的令牌传递给应用服务器进行解密。
youdao
30. The target server receives the request and passes the deserialized token to the application server for decryption.
目标服务器接收请求,并将反序列化后的令牌传递给应用服务器进行解密。
youdao
decryption




