cryptogram

n.  密码(电)文;暗号

复数:cryptograms

COCA.38785



双语例句

  1. The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
    数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。
  2. Analysis showed that the cryptogram formed by adding chaotic signal has good security; chaotic signal is an efficient tool for en6urin information safety.
    分析所得的结果表明,把混沌加入语音信号中形成的密文保密特性较好,不易被限免,混沌是一种有效的保障信息安全的工具。
  3. The phonetic signal encryption is implemented through the computer simulation, and two kinds of keys are used for decryption of the cryptogram.
    通过计算机仿真,实现了语音信号的加密工作,对密文用两种解密钥进行解密。
  4. In the scroll stochastic synchronous jump code way to recognize cryptogram and possess the characteristic, cryptogram cannot be decoded and a key used for multi-lock.
    采用滚动式随机同步跳码方式进行密码识别,具有密码不可限免和一钥多锁等特点,彻底杜绝了丢油事件的发生。
  5. Software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.
    软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。
  6. In this paper, through analyzing the advantages and security of RSA encryption system and chaotic encrypt, a new grouping double-key cryptogram scheme is presented.
    在分析了RSA公钥加密系统和混沌加密各自的优点及其存在的安全问题的基础上,提出了一种新的分组双密密钥密码方案。
  7. Why wouldn't Saknussemm have hidden an incredible invention behind this confusing cryptogram?
    为什么萨克努姗不能把不可思议的发现隐藏在打乱的密码里呢?
  8. The electronic seal is used in the condition of setting verification cryptogram and it can be used only by inputting the right PIN code.
    电子印章使用的时候,必须设置了校验密码,只有输入正确的PIN码才可以使用电子印章。
  9. The development and application of information technology accelerate information security, cryptogram arith-metic is important to information security.
    信息技术的发展与应用促进了信息安全不断的延伸,在信息安全技术中安全的密码算法是最重要的。
  10. The key technology to guarantee the security of electronic commerce is cryptogram.
    保证电子商务安全的关键技术是密码技术。
  11. The design of the system also uses the technology of information network security and the theory of the cryptogram.
    同时,系统在设计上充分利用了信息网络安全技术以及密码理论。
  12. A design scheme of cryptogram transmission system based on FPGA is presented, which is used to implement the simulation of the quantum transmission channels.
    提出了基于FPGA的密码传输系统的设计方案,用于模拟高斯密钥在量子信道上的传输,并完成了FPGA上电配置电路的设计。
  13. Research and Application of Cryptogram Technology in Network Security
    网络安全中的密码技术研究及其应用
  14. The security program builds largely upon sound cryptogram arithmetic and secure key management.
    密码算法的安全性很大程度上依赖于密钥的安全性。安全设计离不开密码算法的支持和安全的密钥管理。
  15. This system of confidentiality is realized by cryptogram system.
    本系统通过数字签名来实现这一功能。
  16. In security communication, the cryptogram generator is a key device.
    在保密通信中,最关键的是要有一个可靠的密码产生器。
  17. The model of USB Security Key was developed, and each part of the model was studied and analyzed. A conclusion was drawn that the most important thing in designing USB Security Key was the establishment of cryptogram protocol and the selection of cryptogram method.
    在此基础上,构建了USB安全钥的系统模型,并对此模型的各部分进行了分析和研究,建立了USB安全钥中最重要的密码协议,选择了适用的密码方法。
  18. And, give the total design scheme and system structure of RSA cryptogram chip, expound the design technology and method of high speed parallel RSA arithmetic hardware using three steps pipeline technology.
    在此基础上,设计了RSA密码芯片的总体方案和系统结构;阐述了运用三级流水线技术,实现高速并行RSA算法硬件的设计技术和方法;
  19. In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced.
    本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。
  20. Cryptogram programming of confidential information is an effective tool for ensuring information security.
    机密信息的密码化是保证信息安全的一种有效手段。
  21. The ECC and classical public key cryptogram system are compared.
    比较了ECC与经典公钥密码体系间的优劣;
  22. It is necessary to mix address code in transform process of input TOD as block cryptogram.
    地址码必须如分组密码方法那样,混淆在对TOD输入的变换过程之中。
  23. Cryptographic algorithm and key are the very important part of cryptogram technology.
    密钥和密码算法的安全是密码卡的核心和关键。
  24. This paper summarizes the development and applications of information security technologies, especially the cryptogram technology.
    文章综述信息安全技术,特别是密码技术的发展与应用。
  25. It studied the security technology related to information system, included cryptogram technology, Fire Wall technology, database security technology, digital signature, authentic technology and VPN technology.
    研究了信息系统相关的信息安全技术,包括密码技术、防火墙技术、数据库安全技术、数字签名、认证技术、VPN技术。
  26. High performance cryptogram server provides a safe, highly effective platform of cryptogram programming of information.
    高性能密码服务器提供了一个安全、高效的信息密码化平台。
  27. This text has discussed that the digital watermark anti-counterfeit of the products is designed, the means studied with the cryptogram, analyses and proved each link that is designed, and put forward author's unique opinion.
    文章讨论了产品的数字水印防伪设计,运用密码学的手段,对设计的各个环节进行了分析和论证,提出了作者独特的见解。
  28. Bilinear pairings are a common tool in cryptogram.
    双线性配对是在密码学中常用的工具。
  29. According to its feature, we can design some cryptogram algorithms which are adapted to many kinds of network.
    根据其性质可以设计出适用于各种网络的密码算法。
  30. Cryptogram is the core of information security, chaos-based Encryption is a new research direction of Cryptogram.
    密码是信息安全的核心,混沌密码是密码学的一个新的研究方向。

英英释义

noun

  1. a piece of writing in code or cipher

      Synonym:    cryptographsecret writing