您要查找的是不是:
- Under the open standard connection of CA, the disturbing program with the multilayered encryption mechanism, uses the symmetrical and the asymmetrical encryption algorithm, while it products the authorized user news and management news. 通过节目加扰和多层加密机制,在ca开放的标准接口下,采用对称和非对称加密算法,完成用户的授权消息和用户管理消息的生成。
- asymmetrical encryption algorithm 非对称加密算法
- Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data. 对最优不对称加密填充(OAEP)密钥交换数据进行解密。
- Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family( CFF). 我的翻译是:基于多项式和“CFF”的绝对安全的非对称性加密方案。
- Asymmetric encryption is performed on a small number of bytes and is therefore useful only for small amounts of data. 对少量字节可以执行不对称加密,因此不对称加密对于加密少量的数据很有用。
- In addition, the grid application must handle both symmetric and asymmetric encryption schemes. 此外,网格应用程序必须处理对称及非对称的加密方案。
- Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family (CFF) . 我的翻译是:基于多项式和“CFF”的绝对安全的非对称性加密方案。
- Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family(CFF). 我的翻译是:基于多项式和“CFF”的绝对安全的非对称性加密方案。
- Performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the cryptographic service provider (CSP). 使用加密服务提供程序(CSP)提供的RSA算法的实现执行不对称加密和解密。
- The study and application of asymmetric encryption systems, which use one key for encryption and another for decryption. 使用一个加密密钥和一个解密密钥的不对称加密系统的研究和应用。
- Performs asymmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm. 使用高级加密标准(AES)算法的加密应用程序编程接口(CAPI)实现执行非对称加密和解密。
- Most people's faces are asymmetrical. 多数人的脸并不对称。
- The RDP protocol uses the RC4 symmetric encryption algorithm with up to 128 bit keys.The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used. RDP协议的使用对称加密算法rc4多达128位钥匙.;rc4加密后所产生的一个初步的交流;其中的关键是使用RSA的非对称加密
- Security such as for example, the use of symmetric and asymmetric encryption, secure hashing, digital certificates and signatures, firewalls, transport and application level security. 安全性如同步或异步加密的使用、安全散列法、数字认证和签名、防火墙、应用层安全传输等。
- Asymmetrical Encryption Technology in Software Registration Protection Application 非对称加密在软件保护中的应用研究
- An alternative way to locate the certificate and private key for decrypting the message is to use a certificate's key identifier when encoding the asymmetrically encrypted token. 查找用于解密邮件的证书和私钥的另一种方法是在对非对称加密的令牌进行编码时,使用证书的密钥标识符。
- asymmetrical encryption 非对称加密
- the asymmetrical encryption 非对称加密
- They are best used to encrypt files on a hard disk. 它们最习惯于加密储存在硬盘上的文件。
- Using encryption takes a bit of forethought. 使用加密功能就必须要事先做些准备工作。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries