decryption
美 [di'krɪpʃn]
英 [di:'krɪpʃn] 
英汉解释
例句
Note that decryption uses the corresponding private key of the public key used for encrypting the XML.
请注意,解密过程使用的是加密XML时使用的公钥所对应的私钥。
The CSP generates the public and private key pair used for the encryption and decryption of messages.
CSP生成用于信息加密和解密的公钥和私钥对。
On decryption, each event is written to disk, unencrypted, and the plain text read back in to be displayed to the user.
在解密阶段,每个事件都被写到磁盘上,然后进行解密,最后读回纯文本并显示给用户。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
The recipient's unique information is then used in a decryption operation performed against the encrypted message .
然后,使用收件人的唯一信息对加密邮件执行解密操作。
This book reveals the Windows platform for a comprehensive encryption and decryption technology!
本书全面揭示Windows平台的加密与解密技术!
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.
公钥加密湜使苚弌对非对称菂密钥加密或解密菂技术。
The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1].
公钥系统采用一对数学上相关的序列,一个用于加密,另一个用于解密。
If the private key is encrypted with a password in the database, the decryption password must be specified.
如果在数据库中使用密码对私钥进行加密,则必须指定解密密码。
The result of simulation shows that the algorithm can give satisfactory result of encryption and decryption.
仿真结果表明,该算法具有很好的加密、解密结果。
The DECRYPTION BY PASSWORD clause can be omitted if the password in the file is protected with a null password.
如果文件中的密码受空密码保护,则可省略DECRYPTIONBYPASSWORD子句。
It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption.
介绍一种结合数字水印技术解决动态加解密密钥安全性的设计方案。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
In public-key or two-key encryption, a key pair is used for encryption and decryption.
公钥加密是使用一对非对称的密钥加密或解密的技术。
It is capable of message digests, encryption and decryption of files, digital certificates, digital signatures, and random numbers.
它可以实现消息摘要、文件的加密和解密、数字证书、数字签名和随机数字。
Instead, the other key in the pair must be used for the decryption.
相反,这对密匙值的另外一个密匙必须用于解密。
A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format.
保护程序是一种可以控制对特定文件格式的权限管理文件进行加密和解密的程序。
Sets the key being used for Passport encryption and decryption.
设置用于Passport加密和解密的密钥。
This process of changing information into a code is encryption and the process of changing code back is decryption .
将信息更改为代码的这一过程称为加密,而将代码重新更改为信息的过程则称为解密。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
Keys are used for digitally signing documents and verifying signatures , and they help with the encryption and decryption processes .
密钥用于数字签署文档和验证签名,也用于加密和解密过程。
The string manipulation functions in Listing 13 replace the lost formatting before the decryption command is called.
在调用解密命令之前,清单13中的字符串操作函数将替换丢失的格式。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
Its encryption and decryption operations are in the system drive layer and the whole process is completely transparent.
加解密操作均在系统的驱动层实现,整个过程对用户完全透明的特点。
Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key .
此类非对称转换较比使用对称密钥进行加密和解密的方法,其开销更大。
Encryption and decryption of a cookie are performed by the same Client Access server.
Cookie的加密和解密由同一台客户端访问服务器执行。
Security -- authorization of the request, encryption and decryption as required, validation, etc.
安全性——请求的授权、加密和解密(在需要时)、确认等等
The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation.
RSA算法的解密性能与大数模幂运算的实现效率有着直接的关系。
Decryption: The decryption ability reveals all enemy movements within a sector. Orders are represented by red arrows.
解密:解密才干可揭露指定分区中友好部队的意向,并以红色箭头表示。
You must specify the validation key, decryption key, and the type of encryption used for validation of data.
必须指定验证密钥、解密密钥以及用于数据验证的加密类型。
GOST encryption standards the former Soviet Union, the former Soviet Union, a Chinese encryption and decryption of the source code.
gost前苏联加密标准,前苏联的一中加密解密的源代码。
Symmetric encryption and decryption is relatively fast, and is suitable for working with large amounts of data.
对称加密和解密速度相对较快,适于处理大量数据。
Concentration of this 3-year domestic encryption and decryption technology, a very worthy collection!
浓缩了这3年来国内加密与解密技术的发展,非常值得收藏!
Step 5: The final step in the decryption process is to call either the decryptInPlace or decrypt method on the Decryptor object.
步骤5:解密过程的最后一个步骤是在Decryptor对象中调用decryptInPlace或者decrypt方法。
a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion.
一种非线性流式加密算法,对称加密,它的加密和解密都是用同一把密钥完成。
In order to perform the decryption, the receiver must be in possession of a special piece of data called the key.
为了进行解密,接收者必须有称为密钥的特殊数据。
At decryption time, the same authenticator must be passed to DecryptByKey.
解密时,必须将同一验证器传递给。
This paper introduces a number of encryption and decryption technologies on commonly used software.
介绍常用软件加密和软件破解的一些方法。
Access code availability is further controlled by selectively providing for updates of decryption access codes.
接着存取码可用性由选择地提供用于更新解密存取码控制。