國文屋

位置:首頁 > 造句 > 

“encryption algorithm”造句,怎麼用encryption algorithm造句

造句2.53W

Security and efficiency improvement for image encryption algorithm based on high-dimension chaotic system

If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.

In addition, this model protects the password using encryption algorithm, and can defend the attack of replay and sniffing.

The encryption algorithm is architecture and language-independent. However, both the sender and the receiver must know the secret key.

As the representative of tradition block encryption algorithm, DES has a deadly weakness that is too small key space to prevent exhaust attacks.

All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.

Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.

encryption algorithm造句

This article discusses the encryption algorithm of PC hard disk serial number with software according to the RSA encryption algorithm.

The SSL Server responds with the encryption algorithm and hash function to be used.

In this paper, LIU's high intensity public encryption algorithm is studied, and a multimedia data encryption & decryption software system is designed.

Under the open standard connection of CA, the disturbing program with the multilayered encryption mechanism, uses the symmetrical and the asymmetrical encryption algorithm, while it products the authorized user news and management news.

Research and realization of image encryption algorithms based on discrete chaos CAT

Research on digital image encryption algorithm based on compound chaotic image second-scrambling

The encryption algorithm used on the source file needs a bigger key buffer than the one on the destination file.

Efficient identity-based encryption algorithm in wireless sensor networks

If you can't read the data when you have accessed it, the decryption keys are corrupted, or the server rejects it because the vendor is using its own encryption algorithm.

Image encryption algorithm based on inter-perturbation of dual chaotic systems