青年中文青年中文

cryptographic algorithms的意思

cryptographic algorithms中文翻譯:

密碼算法

相似詞語短語

algorithms───n.[計][數]算法;算法式(algorithm的復數)

cryptographic───adj.關于暗號的,用密碼寫的

algorithms visualized───算法可視化

cryptographic token───加密令牌

algorithms vazirani───vazard算法

sorting algorithms───排序算法

algorithms definition───算法定義

cryptographic key───[計]密鑰;密碼關鍵字;密碼鍵

cryptographic topics───加密主題

雙語使用場景

There are a variety of cryptographic algorithms to choose from when performing encryption.───在執行加密時,有多種密碼學算法可供選擇。

They will typically employ cryptographic algorithms such as RSA, SHA-1, AES, and Triple-DES.───它們通常都會采用一些加密算法,例如rsa、SHA - 1、AES和Triple - DES。

Ciphers are cryptographic algorithms that can reversibly transform data using a key.───加密是使用密鑰對數據進行可逆轉換的加密算法。

Again , let us remind you that using proprietary cryptographic algorithms , including hash functions, is usually a bad idea .───再次提醒您,使用專用密碼演算法,包括雜湊函數,通常是一個壞主意。

You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application.───可以使用此方法確定選定的加密算法和強度是否滿足您的應用程序的要求。

Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.───黑客可以利用密碼分析技術或惡意的實例資源破解密碼算法。

This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.───此實現不是Windows平臺FIPS驗證的加密算法的一部分。

The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.───簽發機構在證書上“簽名”,用的是通過一種密碼算法產生的散列值。

Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.───維護機密性和完整性的典型解決方案涉及使用現有的安全協議和加密算法。

英語使用場景

It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

Traditionally, the security of cryptographic chips depends on the mathematic complexity of the cryptographic algorithms, the authentication mode and the secure protocol.

Side - channel attacks are serious practical threat against implementation of cryptographic algorithms.

Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.