“encryption algorithm”可以造什么句,encryption algorithm造句

来源:语文精选馆 2.6W
encryption algorithm造句

This article discusses the encryption algorithm of PC hard disk serial number with software according to the RSA encryption algorithm.

The SSL Server responds with the encryption algorithm and hash function to be used.

Image encryption algorithm based on inter-perturbation of dual chaotic systems

In this paper, LIU's high intensity public encryption algorithm is studied, and a multimedia data encryption & decryption software system is designed.

The encryption algorithm used on the source file needs a bigger key buffer than the one on the destination file.

Under the open standard connection of CA, the disturbing program with the multilayered encryption mechanism, uses the symmetrical and the asymmetrical encryption algorithm, while it products the authorized user news and management news.

If you can't read the data when you have accessed it, the decryption keys are corrupted, or the server rejects it because the vendor is using its own encryption algorithm.

Research and realization of image encryption algorithms based on discrete chaos CAT

Efficient identity-based encryption algorithm in wireless sensor networks

Security and efficiency improvement for image encryption algorithm based on high-dimension chaotic system

In addition, this model protects the password using encryption algorithm, and can defend the attack of replay and sniffing.

As the representative of tradition block encryption algorithm, DES has a deadly weakness that is too small key space to prevent exhaust attacks.

Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.

If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.

All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.

The encryption algorithm is architecture and language-independent. However, both the sender and the receiver must know the secret key.

Research on digital image encryption algorithm based on compound chaotic image second-scrambling

热门标签