cipher text

英 [ˈsaɪfə(r) tekst] 美 [ˈsaɪfər tekst]

密码报文;密码电文;密文;密码文本

计算机



双语例句

  1. Or it could be a cipher, in which text is converted into other text using some algorithm.
    或者可以是密码的形式,通过某种算法将某种文本转换为其他文本。
  2. It shifts the letter in the plain message n character backwards to get the cipher text.
    它把明文消息中的字母向后偏移n个字符,从而产生密文文本。
  3. The cipher byte array is then decrypted, and the decrypted byte array is returned as a text string.
    接着对该密码字节数组解密,解密的字节数组作为文本字符串返回。
  4. When decrypting the maximum length of the cipher text is the length of the modulus in bytes.
    当解密的密文的最大长度是在字节模长度。
  5. This hidden information can be plain text, cipher text, or even images.
    这些隐藏的信息可以使普通文本、密码文本或图像等。
  6. The objective of this article is to find a mechanism for breaking a cipher text.
    本文的目的是寻求打破一密文的机制。
  7. One byte of cipher text is generated for every byte of plain text contained in the message.
    对包含在信息中的普通文本的每一个字节产生密码文本的一个字节。
  8. Before we can encrypt, we need to know the size of the buffer required for the cipher text.
    在我们可以加密,我们需要知道的密文所需的缓冲区大小。
  9. The concrete example of this scenario in Cipher Text is the record editor.
    在这种情况下,在密文具体的例子是记录编辑器。
  10. The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration.
    提出一种基于混沌迭代的加密算法,这种加密算法根据混沌迭代确定的位置将明文填入一个较大的密文空间。
  11. Furthermore, by encoding a random number, we avoid the possibility of deducing the secret key provided that the cipher text is known.
    更进一步,通过预加密一个随机数的办法,消除了已知明文导出密钥的可能性。
  12. A novel scheme of the mobile agent with the cipher text only signature verification
    一个采用惟密文验证签字的MobileAgent新方案
  13. The intermediate encrypted result M9 is obtained by the algorithm, the last round key of AES-128 can be deduced from M9 and a correct cipher text, the initial key of AES-128 is then recovered.
    该算法可以得到AES-128的中间加密结果M9,利用M9和一组正确密文可以推出AES-128的最后一轮轮密钥,从而恢复AES-128的初始密钥。
  14. The other problem is caused by the order shift of plaintext after encryption, so, it needs a method which can query cipher text quickly.
    另一问题是由于明文加密后不再保持原有的顺序关系,因而不可能再对其进行直接查询。故需要设计一种能够对密文进行快速查询的机制。
  15. Combined with an onion routing scheme, a mobile agent system, by using the cipher text only signature verification, is presented to enhance its security and reliability.
    结合洋葱路由技术,提出了一个采用惟密文数字签名验证的移动代理系统新方案,以增强移动代理的安全可靠性。
  16. Up till now, Baptista's cryptosystem scheme and its improved versions can not effectively solve some problems, such as long cryptographs, slow encryption speed, non-uniform distribution of cipher text, lower security and so on.
    目前为止Baptista密码方案及其改进版本仍没有很好地综合解决密文长度较长、加密速度较慢、密文分布不均匀和安全性不高等问题。
  17. The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher.
    通过使用动态密码对明文的修补,使其密文长度与明文长度相等。
  18. Cipher text data in the inquiries, the character data using two-phase query algorithm; numerical data for the B~+ tree-based query algorithm, and compared to the traditional search algorithms, both to improve the efficiency of search algorithms have improved.
    在密文数据的查询方面,对于字符型数据采用两阶段查询算法;对于数值型数据采用基于B~+树的查询算法,与传统的查询算法相比,以上两种改进的查询算法的效率都有所提高。
  19. Simulation results show that this kind of image encryption algorithm has a good confusion and diffusion effects. It can against brute-force attack and known plaintext cipher text attack, as well as a higher performance and effect in application.
    从仿真实验结果表明该算法有非常好的置乱和扩散效果,可以对抗穷举攻击以及己知明文密文对攻击,同时具有更高的性能,在实际应用中有非常好的效果。
  20. The operations of group member such as joining and exiting should be authenticated by group other members. The monitoring between group members adopts the method which divides members into smaller groups. Cipher text is used in the transmission of contol datagram.
    组成员的加入、退出等操作首先要经过组其它成员的认证,组成员之间的监测采用分组方式,控制报文采用密文传输。
  21. In our system, cipher text is labeled with sets of attributes and is divided into fine-grained level which designed by user, private key is generated by Key-Generator that using auto-rolling technical.
    在我们的安全系统中,密文由其属性所标志,并根据用户的需求划分成任意的细粒度,密钥通过采用了滚动技术的密钥生成器来产生。
  22. This system has the characters such as cipher text high security, convenience of key management, key transport security and so on.
    本系统具有密文安全性高、密钥管理方便、密钥传输安全等特点。
  23. LPO uses a tiny encryption algorithm, since the agreement case on the label side storage cipher text to verify the method of random number of two-way authentication.
    该协议使用分组密码中的极小加密算法,通过在标签端预存储密文以验证随机数的的方法实现了双向认证。
  24. Cryptography will be spread for the cipher text to achieve copyright protection. With digital signature to the message digest appended to the protection of information, the purpose is to prove that the protected information is true and complete.
    密码技术将被保护对象加密为密文进行传播,实现版权保护;数字签名技术对被保护信息处理,将得到报文摘要附加到保护信息中,证明被保护内容的真实、完整。
  25. As one of the searchable encryption techniques, public key encryption with conjunctive keywords search, which retrieves the cipher text by matching some of its properties, has more extensive valuable in both research and application.
    带关键词的可搜索公钥加密机制是密文搜索技术的一种,它通过对密文部分属性进行匹配从而达到检索密文的目的,具有广泛的研究和应用价值。