cryptographic
美 [ˌkrɪptə'græfɪk]
英 ['krɪptəʊ'græfɪk] 
- adj.关于暗号的
- n.隐晶文象状
- 网络密码;密码的;用密码写的
英汉解释
英英解释
例句
When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature.
当处于“record”模式时,这些停顿时间将被扩展为字符串并用于生成签名的密码散列。
The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase.
然后,开发的签名将被转换为密码散列并存储到磁盘中,以供稍后在监视阶段中进行比较。
After setting up the cryptographic library, the next step is to exchange certificates between the systems.
设置CryptographicLibrary之后,下一步是在系统之间交换证书。
An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.
Java密码扩展系统的一个实现在Sun的网站中可以找到密码服务提供者的目录。
They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one.
他们可以寻找密码算法中的缺陷,然后恶意修改它们,让强的加密算法变弱。
Again , let us remind you that using proprietary cryptographic algorithms , including hash functions, is usually a bad idea .
再次提醒您,使用专用密码演算法,包括杂凑函数,通常是一个坏主意。
The specified cryptographic service provider cannot be used for the selected Certificate Template.
不能为所选的证书模板使用指定的加密服务提供程序。
A popular idea is to have email servers provide cryptographic keys so that messages can be verified as they arrive in an inbox.
其中呼声很高的一个方案就是要求邮件服务器提供密匙,以便当邮件抵达时,判断其有效性。
You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application.
可以使用此方法确定选定的加密算法和强度是否满足您的应用程序的要求。
BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.
BLS短签名是双线性密码学中应用最为广泛的密码元件之一。
Unable to store the public cryptographic key of this computer. This computer cannot send or receive encrypted messages.
无法存储这台计算机的公用加密密钥。这台计算机无法发送或接收经过加密的消息。
Gets or sets the name of the cryptographic provider used to generate the digital signature of the message.
获取或设置用于生成消息数字签名的加密提供程序的名称。
The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.
无法存储此计算机的公用密钥。此计算机无法发送或接收加密消息。
When overridden in a derived class, creates an instance of the specified implementation of a cryptographic random number generator.
在派生类中重写时,创建加密随机数生成器的指定实现的实例。
The root of trust within a cryptographic system starts with a key, which needs to be accessed and stored securely .
加密系统中的信任根从需要安全访问和存储的密钥开始。
Class defines the algorithm used for a cryptographic operation.
类定义用于加密操作的算法。
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.
身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
On top of it are the middle layer of access, audit, and cryptographic controls and then the outermost layer of technologies.
其上部是包含访问、审核和加密控制的中间层,然后是技术所在的最外层。
Specify the location of a key container from the system's cryptographic service provider (CSP) to use to name the assemblies.
指定用于命名组件的系统中,密码编译服务提供者(CSP)的金钥容器位置。
Principals share their cryptographic key with the authentication server of the realm to which they belong.
主体与它们所属领域的身份验证服务器共享密钥。
Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.
先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。
Specifies the name of the cryptographic provider on the system.
指定系统上的加密提供程序的名称。
You do not have to generate a new cryptographic key pair for every assembly you want to give a strong name.
您不必为您希望赋予强名称的每个程序集生成新的加密密钥对。
This firmware is available on a limited basis from IBM, and essentially turns the 4758 Coprocessor into a cryptographic processor.
这个固件在来自IBM的受限基础上可用,并在本质上将4758Coprocessor变成了密码处理器。
The previous step generates cryptographic keys and a password used in LTPA token generation.
之前的步骤生成用于生成LTPA令牌的密钥和密码。
It prevents saving configuration in IBM Cognos Configuration by guarding the establishing of cryptographic information with a password.
它用密码保护密码学信息的建立,从而阻止在IBMCognosConfiguration中保存配置。
Provided the session key has not been compromised , the value of the cryptographic function will be the same at each of the correspondents .
该值与生成会话密钥所需的信息一起在对应方之间进行传输。
The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).
Windows密码API(cryptoAPI)密码服务提供程序(CSP)的名称。
These entities are usually stored in a file or disk or in a key container owned by a Crypto API Cryptographic Service Provider (CSP).
这些实体通常存储在文件或磁盘中,或者存储在加密API加密服务提供程序(CSP)所拥有的密钥容器中。
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
Outlook uses certificates in cryptographic e-mail messaging to help provide more secure communications.
Outlook在电子邮件加密中使用证书来帮助提供更加安全的通信。
Creates an instance of an implementation of a cryptographic random number generator.
建立密码编译乱数产生器之实作的执行个体。
The value of the cryptographic function cannot be compromised or modified without access to the session key .
只要该会话密钥没有受到损害,对应双方的加密函数值就是相同的。
Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.
其他特性还包括加密散列函数,加密转换库和加密硬件支持。
You must have at least one cryptographic service provider installed to perform this operation.
要执行这个操作,至少要安装一个加密服务提供程序。
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer(SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.
SSL中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。
"Key Management" is the term used to encompass the various actions related to the generation and protection of cryptographic keys.
“密钥管理”是一个术语,包括与生成和保护密钥相关的各种操作。
This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.
此实现不是Windows平台FIPS验证的加密算法的一部分。
Moreover, the cryptographic mode will offer India a first national secure identification capability for protecting its own assets.
此外,加密模块将为印度提供第一个国家安全识别能力以保护自己的资产。