decryption

decryption

美 [di'krɪpʃn]  英 [di:'krɪpʃn]

  • n.解释编码的数据
  • 网络解密;译码;解密模块

英汉解释

n.
1.
解释编码的数据

例句

Note that decryption uses the corresponding private key of the public key used for encrypting the XML.

注意解密过程使用加密XML使用公钥对应私钥

The CSP generates the public and private key pair used for the encryption and decryption of messages.

CSP生成用于信息加密解密公钥私钥

On decryption, each event is written to disk, unencrypted, and the plain text read back in to be displayed to the user.

解密阶段每个事件磁盘然后进行解密最后文本显示用户

The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.

系统有效防止网络内部重要数据通过网络泄露出去无需用户进行手动加密解密操作

The recipient's unique information is then used in a decryption operation performed against the encrypted message .

然后使用收件人唯一信息加密邮件执行解密操作

This book reveals the Windows platform for a comprehensive encryption and decryption technology!

全面揭示Windows平台加密解密技术

Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.

公钥加密使非对称加密解密技术

The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1].

公钥系统采用一对数学上相关序列一个用于加密另一个用于解密

If the private key is encrypted with a password in the database, the decryption password must be specified.

如果数据库使用密码私钥进行加密必须指定解密密码

The result of simulation shows that the algorithm can give satisfactory result of encryption and decryption.

仿真结果表明算法具有加密解密结果

The DECRYPTION BY PASSWORD clause can be omitted if the password in the file is protected with a null password.

如果文件密码密码保护省略DECRYPTIONBYPASSWORD子句

It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption.

介绍一种结合数字水印技术解决动态密密安全性设计方案

Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

对称算法非常有效并且可以用于加密解密计算单一密钥一起使用

In public-key or two-key encryption, a key pair is used for encryption and decryption.

公钥加密使用一对对称加密解密技术

It is capable of message digests, encryption and decryption of files, digital certificates, digital signatures, and random numbers.

可以实现消息摘要文件加密解密数字证书数字签名随机数字

Instead, the other key in the pair must be used for the decryption.

相反另外一个必须用于解密

A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format.

保护程序一种可以控制特定文件格式权限管理文件进行加密解密程序

Sets the key being used for Passport encryption and decryption.

设置用于Passport加密解密密钥

This process of changing information into a code is encryption and the process of changing code back is decryption .

信息更改代码过程称为加密代码重新更改信息过程称为解密

In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.

第三展示如何生成一个用于Kerveros通信进行加密解密密钥

The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.

加密过程解密过程一般称作密码术依赖数学算法

Keys are used for digitally signing documents and verifying signatures , and they help with the encryption and decryption processes .

用于数字签署文档验证签名用于加密解密过程

The string manipulation functions in Listing 13 replace the lost formatting before the decryption command is called.

调用解密命令之前清单13字符串操作函数替换丢失格式

This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

安全策略使用非对称加密执行数字签名验证加密解密

Its encryption and decryption operations are in the system drive layer and the whole process is completely transparent.

解密操作系统驱动实现整个过程用户完全透明特点

Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key .

此类对称转换较比使用对称密钥进行加密解密方法开销

Encryption and decryption of a cookie are performed by the same Client Access server.

Cookie加密解密同一客户端访问服务器执行

Security -- authorization of the request, encryption and decryption as required, validation, etc.

安全性——请求授权加密解密需要)、确认等等

The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation.

RSA算法解密性能运算实现效率有着直接关系

Decryption: The decryption ability reveals all enemy movements within a sector. Orders are represented by red arrows.

解密解密才干揭露指定分区友好部队意向红色箭头表示

You must specify the validation key, decryption key, and the type of encryption used for validation of data.

必须指定验证密密以及用于数据验证加密类型

GOST encryption standards the former Soviet Union, the former Soviet Union, a Chinese encryption and decryption of the source code.

gost苏联加密标准苏联加密解密代码

Symmetric encryption and decryption is relatively fast, and is suitable for working with large amounts of data.

对称加密解密速度相对较适于处理大量数据

Concentration of this 3-year domestic encryption and decryption technology, a very worthy collection!

浓缩3国内加密解密技术发展非常值得收藏

Step 5: The final step in the decryption process is to call either the decryptInPlace or decrypt method on the Decryptor object.

步骤5:解密过程最后一个步骤Decryptor对象调用decryptInPlace或者decrypt方法

a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion.

一种非线性加密算法对称加密加密解密同一密钥完成

In order to perform the decryption, the receiver must be in possession of a special piece of data called the key.

为了进行解密接收必须称为密钥特殊数据

At decryption time, the same authenticator must be passed to DecryptByKey.

解密必须同一验证器传递

This paper introduces a number of encryption and decryption technologies on commonly used software.

介绍常用软件加密软件破解一些方法

Access code availability is further controlled by selectively providing for updates of decryption access codes.

接着存取可用选择地提供用于更新解密存取控制

热门查询