ciphertext

网络  密码文本; 暗文; 密文; 密码; 加密文字

计算机



双语例句

  1. To protect against eavesdropping, an application must encrypt the information before sending it, converting it from plain text to unreadable ciphertext.
    为了保护信息免遭窃听,应用程序必须在发送信息前先对其加密,将它从明文转换为无法读懂的密文。
  2. By examining the ciphertext, you can use a few heuristic tricks to figure out the plaintext has been shifted two characters.
    通过检查暗文并借助一些启发式的技巧,您可以知道,明文实际上是移动了两个字符。
  3. Study of Some Problems of Quantum Cryptography and Theoretical Security of Cryptosystem; Study on the Public Key Cryptosystem Secure Against Chosen Ciphertext Attack
    量子密码和密码体制理论安全若干问题研究抗选择密文攻击公钥密码体制的研究
  4. Modern encryption algorithms are necessarily more sophisticated because the ciphertext may often be protecting information worth thousands or millions of dollars.
    现代加密算法必须更为复杂,因为密码文本常用户保护价值数十万或数百万美元计的信息。
  5. Using a file input and output ciphertext expressly to carry out the test.
    用的是文件输入输出明文密文,进行了测试。
  6. Gray-box analysis of chosen ciphertext security for public key encryption scheme
    公钥加密体制选择密文安全性的灰盒分析
  7. Now, if you have some message, you just need to interpret its bytes as a number "M." If you want to "encrypt" a message to create a "ciphertext", you'd calculate
    现在,如果你有一些消息,那么你只需要将该消息的字节翻译成一个数“M”,若要对这个消息进行“加密”形成“密文”的话,你就这么计算
  8. Encryption is the process of transforming plaintext into ciphertext, while stenography hides the message in covers to transmission.
    信息加密将明文变成密文,信息隐藏将数据隐藏在某种载体中。
  9. Thus, plaintext is now garbled ciphertext.
    这样,普通文本就捣弄成了密码文本。
  10. In cryptography, the total set of ciphertext messages that can be produced by encrypting all messages in the message space with all the keys in the key space.
    在密码学中,明文空间中所有信息和密钥空间所有密钥可能发生的密文的全集。
  11. If an authenticator was included when the ciphertext was encrypted, the authenticator must be provided at decryption time.
    如果对加密文本进行解密时包括验证器,则必须在解密时提供该验证器。
  12. In the context of message security, plaintext is used to differentiate from ciphertext to indicate that the text is not encrypted.
    在讨论邮件安全性的上下文中,纯文本用于区别密码,以指出该文本未加密。
  13. Chosen Ciphertext Secure Identity-based Encryption in the Standard Model
    标准模型下选择密文安全的基于身份加密方案
  14. The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.
    差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。
  15. This seed is encrypted, and the result is combined with a block of plaintext to produce the ciphertext.
    加密种子后,将加密结果与明文块结合产生密文。
  16. Without breaking the encryption, a hacker can infer significant information from the context in which the ciphertext is stored.
    黑客无需进行解密,即可根据存储密文的上下文推断出重要信息。
  17. According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.
    根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。
  18. During compression process, the ciphertext's quality is controlled by the encryption quality factor.
    在压缩编码过程中,通过加密质量因子控制对多媒体敏感参数的加密强度,从而实现对密文质量的控制。
  19. Given the public-key and a ciphertext, we recover the corresponding plaintext in polynomial time.
    给定公开密钥和密文,在多项式时间内还原相应的明文。
  20. Then, the attacker is given the ciphertext he should challenge.
    然后,攻击者被给定一个挑战密文;
  21. Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.
    针对数据库中数据的保密性问题,分析了目前已有的一些加密机制,提出了一种基于密文索引的新的查询方法。
  22. But any attacker easily gets the plaintext message given known ciphertext for the inherent periodic property of trigonometric function.
    但是由于三角函数的固有周期性,攻击者在已知密文的条件下很容易解出明文,使得攻击容易得逞。
  23. In addition, the plaintext determined block length can effectively resist chosen plaintext attack and chosen ciphertext attack.
    此外,明文相关的分组长度可以有效的抵御选择明文或选择密文攻击。
  24. This paper studies the cloud storage environment ciphertext relational database retrieval problems.
    本文主要研究云存储环境下的关系型数据库的密文检索问题。
  25. In such system, the ciphertext and key was appeared in two forms: normal or semi-functional.
    在双系统中,密文呈现出两种形态:正常态和半功能态。
  26. We found that this scheme cannot resist chosen plaintext attack, cho-sen ciphertext attack and known plaintext attack.
    实现了对该方案的选择明文攻击、选择密文攻击和已知明文攻击。
  27. Based on these flaws, only 6 pairs of plaintext/ ciphertext are used for revealing the equivalent keys.
    基于以上缺陷,用了6个明文/密文对就成功地获得了等效密钥。
  28. The ciphertext reveals much information.
    密文泄露了很多的信息。
  29. For this deficiency, we propose the ciphertext retrieval technology based on search history.
    针对这个不足,本文提出了基于搜索历史的密文检索结果排序技术。