cryptographic中文,cryptographic的意思,cryptographic翻译及用法

2025-09-06 21:47 浏览次数 6

cryptographic

英['krɪptəʊ'græfɪk]美[ˌkrɪptə'græfɪk]

adj. 关于暗号的,用密码写的

cryptographic 英语释义

英语释义

  • of or relating to cryptanalysis

cryptographic 片语

片语

cryptographic function翻译

cryptographic key[计] 密钥;密码关键字

cryptographic communication[通信]

cryptographic algorithm密码算法

cryptographic digest加密摘要

cryptographic protocol密码协议

Cryptographic attribute加密属性

Cryptographic checksum密码校验和

cryptographic synchronization密码同步

cryptographic 例句

英汉例句

  • a ticket is provided by an authentication server to the client using a cryptographic key of the intended server.

    身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。

  • as with any cryptographic keys, these should be changed periodically.

    与任何密码术密钥一样,应该定期改变这些密钥。

  • this feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the acf.

    此特性让这三种关键的安全技术能够利用acf提供的硬件密码计算加速设施。

  • infoq - how far are we from quantum computing solutions to some of the cryptographic issues raised in the intel technology journal?

    现实中我们离因特尔的技术中所提出的运用量子计算的方法来解决一些加密的问题还有多远的距离?

  • if the device only performs a simple cryptographic function, all of the objects must be managed by the software.

    如果设备只执行简单的密码功能,则所有对象必须由软件来管理。

  • this is a cryptographic protocol that takes as its inputs, among others, any attributes to be encoded into the token.

    这是在一部分输入和属性需要编码到令牌中的时候所要采用的加密协议。

  • the certificates used in ssl contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.

    ssl中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。

  • revocation in this case must be based on the cryptographic fingerprint of the certificate, and the mechanism that provides this functionality is a certificate revocation list (crl).

    在此情况下,撤销必须基于该证书的加密指纹,而提供此功能的机制就是证书撤销列表 (crl)。

  • these rules specify the order in which messages are sent, the format of each message, and the way cryptographic algorithms are applied to network communications.

    这些规则指定消息发送的顺序、每条消息的格式以及对网络通信应用加密算法的方式。

  • hackers can go further by finding out the latest version of cryptographic algorithms and then on their own machines do reverse-engineering to learn how the algorithms work.

    黑客还可以查明密码算法的最新版本,然后在自己的计算机上执行反向工程以了解算法的工作过程。

  • one of the museum exhibits is this underground magnet antennae from the ‘bita’ cryptographic hardware.

    博物馆的展馆之一,是来自于「碧塔海」加密硬件的地下磁铁天线。

  • defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.

    深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。

  • this allows a long running exchange to use symmetric cryptographic operations to protect the messages during an established session.

    这允许一个长时间运行的会话使用对称密码操作在一个已建立的会话期间保护消息。

  • ravi and his colleague kevin knight treat translation as a cryptographic problem, as if the foreign text were simply english written in an advanced cipher.

    拉维和他的同事凯文·奈特把翻译当做加密问题,好像外国文字也是用英文书写,只不过使用了某种高级的加密方式。

  • finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographic key.

    最后是强身份验证,其中使用两种或者更多的方法对一个标识进行验证,如密码和加密密钥。

  • as mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity.

    正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。

  • you can even specify in a trusted context definition that a requester must communicate with db2 using the secure sockets layer (ssl) cryptographic protocol.

    您甚至可以在可信上下文定义中指定,请求者必须使用安全套接字层 (ssl)加密协议与db2通信。

  • it is important to note that the procedures followed here and some of the cryptographic artifacts generated here are very insecure and should never be applied to a production environment.

    需要重点指出的是,随后的过程和在此生成的部分加密工件是非常不安全的,所以一定不能应用于生产环境中。

  • the primary principle of jca design is to separate cryptographic concepts from algorithmic implementations, so that different vendors can offer their tools within the jca framework.

    jca设计的主要原理是将密码概念从算法实现中分离出来,以便不同的供应商可以在jca框架内提供他们的工具。

  • a hash is the result of a cryptographic function that takes an arbitrarily sized string of data, performs a mathematical encryption function on it, and returns a fixed-size string.

    哈希是一种加密功能所获得的结果,这种加密需要获取任意大小的字符串数据,并用算法对其进行加密,然后返回一个固定大小的字符串。

  • moreover, the cryptographic mode will offer india a first national secure identification capability for protecting its own assets.

    此外,加密模块将为印度提供第一个国家安全识别能力以保护自己的资产。

  • there may be cryptographic techniques, skill level of vendors’ staff to ensure the security and some new methods may be devised to solve this issue.

    可以借助加密技术和云计算厂商的技能优势,确保信息安全。 同时,可以设计一些新的方法,解决这个问题。。

  • we need to implement cryptographic functionality as well.

    我们还需要实现密码功能。

  • this flexibility allows the stdlls to support any cryptographic device.

    这种灵活性使得stdll可以支持任何密码设备。

  • it includes requirements as they relate to the signature syntax, data model, format, cryptographic processing, and external requirements and coordination.

    它包括涉及签名语法、资料模型、格式、密码处理方面的要求,以及外部要求和协调。

  • we will now try to form a strategy for cryptographic support.

    现在我们将尝试形成一个用于密码支持的策略。

  • rather than revealing a mobile device's owner to service providers, one way to ensure anonymity is for a mobile device to ping services using a cryptographic proof-of-identity.

    保证移动设备匿名的一种方法是运用加密的身份证明来访问服务,这样可以避免将移动设备的机主信息泄露给服务提供商。

  • isolating the application also provides an added level of security because all cryptographic information stays within the device.

    应用程序的隔离还提供了添加的安全性层,因为所有的密码信息驻留在设备里。

  • this handshake produces the cryptographic parameters of the session.

    此次握手将生成会话的加密参数。

相关热词