cryptography信息详情
n.密码学;密码使用法
cryptograph───n.密码,密文;vt.把…译成密码
cryptographs───n.密码,密文;vt.把…译成密码
cryptographer───n.译解密码者;担任密码者
cryptographic───adj.关于暗号的,用密码写的
cystography───n.[特医]膀胱造影术
glyptography───宝石雕刻术
cryptographist───n.使用密码之人;密码专家(等于cryptographer)
cartography───n.地图制作,制图;制图学,绘图法
chartography───n.制图法(等于cartography)
There's cryptography going on.───这里就使用了密码技术。
Finally, there was the issue of cryptography.───最后就是加密问题。
The number that you choose to rotate your letters by is what we call in cryptography, a key.───你选择的旋转字母的数量就是我们在密码学中所说的密匙。
An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.───Java密码扩展系统的一个实现在Sun的网站中可以找到密码服务提供者的目录。
Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.───因此,使用量子加密将选票信息从投票站送往计票中心,也有那么点形象工程的色彩。
The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.───name属性可以是位于System.Security.Cryptography命名空间中的某个抽象类的名称。
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.───由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
Quantum key distribution (QKD) is the core of the quantum cryptography technology which had been proved to be absolutely safe.───量子密码被证明是绝对安全的,其核心技术是量子密钥分配(QKD)。
Neither of these techniques actually breaks the fundamental principles on which quantum cryptography is based.───这些技术并没有打破量子密码学的基础理论。
And anyone communicating by quantum cryptography also would have a sure way to spot spies.
Public-Key Cryptography A more powerful form of cryptography involves the use of public keys.
Quantum cryptography exploits a key principle of quantum mechanics, according to which certain aspects of any subatomic process are inherently unknowable.
Randomness test plays an important role in applied cryptography.
Clearly, one advantage of public-key cryptography is that no one can figure out the private key from the corresponding public key.
Secret-Key Cryptography Secret-key cryptography involves the use of a shared key for both encryption by the transmitter and decryption by the receiver.
These are the basics of single-key cryptography.
The potential commercial and military applications of quantum cryptography are breathtaking.
Furthermore, public-key cryptography can be used for sender authentication, known as digital signatures.