青年中文青年中文

decrypted的意思

decrypted中文翻譯:

vt.譯電文;解密碼;解釋

相似詞語短語

decrepitate synonym───衰老同義詞

decrescendo syn───減量合成

decrees and declarations for morning───早晨的法令和宣言

decrying means───譴責手段

decrease to───vt.減少到

decries synonym───譴責同義詞

decrepitate meaning───陳舊的意義

decrement defined───減量定義

decreet volwassenenonderwijs───成人教育法令

decries deutsch───譴責德國

雙語使用場景

data is decrypted only once, which is a major advantage.───數據只經過一次解密,這是一個主要的優點。

The document is decrypted using the decryption key.───密鑰會被用來對文檔進行解密。

That data can only be decrypted using the private key.───這些數據只能使用私鑰進行解密。

The content can only be decrypted by an agent with the corresponding private key.───只能由代理用相應的私鑰解密該內容。

Please DO CHECK the decrypted result files immediately one by one BEFORE any other operations on these files.───請做檢查結果文件的解密文件,立即逐一對這些行動在任何其他。

The message can only be decrypted with Alice's private key, which has not been transmitted.───該消息只能用小紅的私鑰解密,而該私鑰沒有被傳輸。

You can use the FORCE option to ignore errors , but this option will cause the loss of any data that cannot be decrypted .───您可以使用FORCE選項忽略錯誤,但是該選項會使無法進行解密的數據丟失。

E-mails sent encrypted from a BlackBerry handset at some point have to be decrypted and sent to the recipient's e-mail server.───人們從黑莓手機發送加密的電子郵件,然后再一些地方需要解碼在傳送到接受者的服務器。

Switch and the name of the configuration element to be decrypted .───開關以及要解密的配置元素的名稱一起使用。

英語使用場景

With link encryption, the data must be decrypted and re - encrypted at each of these points.

Bug fix: some titles with corrupt UDF did not get decrypted.

Party A dedicated key can only be decrypted by its public-key encryption of any information.

The files are decrypted when they are read from the disk into memory so that the file data kept in memory is in clear format.

An encrypted message cannot be decrypted by the destination queue manager.

Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation (scheme 1).

Messages encrypted using the public key can be decrypted only by someone with the private key.

Based on DL(discrete logarithm)problem, S1 is decrypted by introducing a multi -channel service parameter and a special polynomial function, S2 is decrypted by Chinese Remainder Theorem.

The images were encrypted and decrypted through exclusive OR algorithm of images and pseudo - random sequence coming from initial security key.