cryptography

cryptography

美 [krɪpˈtɑɡrəfi]  英 [krɪpˈtɒɡrəfi]

  • n.密码学
  • 网络密码术;加密;密码编码学

英汉双解

n.
1.
密码学the art of writing or solving codes

英汉解释

n.
1.
密码学,密码翻译术;密写术

英英解释

n.

例句

An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.

Java密码扩展系统一个实现Sun网站可以找到密码服务提供者目录

Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.

因此使用量子加密选票信息投票送往计票中心那么形象工程色彩

The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.

name属性可以位于System.Security.Cryptography命名空间某个抽象名称

Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.

由于使用不同密匙进行加密解密消息因此这种形式加密称为对称加密

Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe.

量子密码证明绝对安全核心技术量子分配QKD)。

Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based.

这些技术没有打破量子密码基础理论

The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography.

关系互补性本质使得通过公钥加密实现这种唯一标识成为可能

The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world.

量子密码不可侵犯建立真实世界不见得成立假设

OpenSSL is the cryptography library used for SSL communications, and is required by mod_ssl to encrypt HTTP traffic for Apache.

OpenSSL用于SSL通信密码方法并且mod_ssl用来ApacheHTTP通信进行加密

BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.

BLS签名线性密码应用最为广泛密码元件之一

In addition, the quantum cryptography can protect the information in a new way that cannot be eavesdropped by means of classical attack.

另外量子保密可以方法保护信息从而避免经典攻击信息窃取

Students should be able to analyse and prove the information protection capacity of modern cryptography basically after this course.

通过课程学习要求能够从本质上分析证明现代密码信息防护能力

The record-breaking MapReduce approach, he said, is useful in physics, cryptography and data mining.

介绍记录MapReduce方法物理学密码数据挖掘领域也是有用

One of the main applications of single-photon sources is the quantum cryptography, or exactly, the quantum key distribution (QKD).

光子重要应用之一量子密码确切量子分配QKD)。

As a result of technical advances particularly the internet and cryptography - the risks of conveying important information can be lowered.

伴随技术进步特别是先进互联网密码技术使得传递重要信息风险降低

The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography.

加密解密数据安全传输现代密码棘手问题之一

Due to the various applications of the bilinear pairings in cryptography, there have been many pairing-based signature schemes.

由于双线性配对函数表现良好密码特性目前已经引起众多关注

Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology .

整体而言安全秘密通讯学科包括密码密码分析称为密码

The strategy included a recommended set of advanced cryptography algorithms known as "Suite B" .

政策包括一套推荐高级加密算法称为SuiteB”。

The security of public-key cryptography depends on factorization or other difficult mathematical problems.

这种技术之所以安全因为应用因数分解其他困难数学问题

Since the one-time pad is theoretically proven to be undecipherable , quantum cryptography is the key to perfect secrecy.

因为一次插入理论上证明破译密码完全保密答案

Quantum cryptography ensures complete privacy because any attempt to observe the transmission will change the message.

由于任何企图监测传输过程举动都会造成传输信息改变量子密码确保传输完全保密

With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values.

使用公开加密希望接收加密消息一方创建一对

For more precise control, you can use the System. Security. Cryptography classes as well.

进行精确控制可以使用System.Security.Cryptography

A digital certificate is more than just a cryptography key; it is an online credential.

数字证书不仅仅是一个密密一个在线凭证

Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically.

对称用于公钥加密公钥加密使用两个数学上相关一个公钥一个私钥

This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature.

使用方便VB应用程序实现对称密钥公开数字签名算法并且英文编码方式限制

Be signed with a strong name using standard public key cryptography.

使用标准公钥密码系统名称签名

The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).

Windows密码APIcryptoAPI密码服务提供程序CSP名称

Cryptography is the art of "secret writing, " as the word's Greek roots attest.

作为希腊词根资产加密技术一种神秘编写艺术

The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.

公共密码系统保密用于到来消息解密对外消息签名

Among the mass information security technology, cryptography does undoubtedly play an important role.

保障信息安全众多技术密码技术无疑扮演举足轻重角色

The implementation speed of Elliptic Curve Cryptography (ECC) depends on the implementation speed of elliptic curve point multiplication.

椭圆曲线实现速度决定椭圆曲线密码算法ECC实现速度

The security of the Elliptic Curve Cryptography (ECC) is built upon the difficulty of solving the elliptic curve discrete logarithm problem.

椭圆曲线密码体制安全性建立椭圆曲线离散对数问题

In its simplest form, a digital certificate is an asymmetric cryptography key.

数字证书简单形式就是不对称密密asymmetriccryptographykey)。

You do not need to be an expert in cryptography to use these classes.

使用这些不必成为加密方面专家

The threshold cryptography is one of the most efficient and potential techniques.

门限密码体制解决问题一种有效潜力技术

Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.

计算量子密码理论上无法破解任何安全系统一样实践安全取决于系统薄弱

Identity-based cryptography is a rapidly emerging approach to public-key cryptography that public keys can be arbitrary identifiers.

基于身份加密一种用户身份标识符作为公钥加密体制

Question: I'm using an X. 509 certificate with my service and I get a System. Security. Cryptography. CryptographicException.

服务使用X.509证书并且获得一个System.