首页 / 词典 / good

crypto

  • n.加密货币;(政党,社团的)秘密成员,秘密支持者
cryptocrypto

crypto

频次

  • 1
    COMB in ADJ and N (用于形容词和名词前构成其他形容词和名词)表示“秘密的”,“保密的”,“隐秘的”
    Crypto- is added to adjectives and nouns to form other adjectives and nouns which refer to people who have hidden beliefs and principles.

  1. The Application of Number Theory in Public Key Crypto System

    关于数论在公开密钥加密体制中的应用

  2. Data structure and storage of secret key in crypto system

    密码系统中的密钥数据结构与存储方案

  3. At Last , I expect the development of application of crypto system .

    在论文的最后,对密码体制的应用进行了展望。

  4. You could use the same approach to help solve Crypto problems .

    您可以使用同一种方法来帮助解决密码问题。

  5. Application of the Logic Crypto Memory in the Gas Machine of Intelligent Card

    逻辑加密存储芯片在智能卡加油机中的应用

  6. Synthetic crypto system and computer network security

    综合型密码系统与网络通信安全性

  7. Study on the Realization of Crypto Arithmetic Function Using Applicable Specific Programmable Logic

    利用特定应用可编程逻辑实现密码算法功能的研究

  8. For the parallel AES crypto algorithm , two methods are used to parallel .

    本文AES加密算法的并行化采用了两种并行方式。

  9. Support for hardware crypto devices via an asynchronous interface is under development .

    通过一个异步接口支持硬件加密设备的工作正在开发中。

  10. Protect your confidential and private data with Best Crypto now !

    保护您的机密和私人数据与最佳密码吧!

  11. Crypto technology and Its Application to Electronic Payment

    密码技术及其在电子支付中的应用

  12. A Method to Encode Crypto - key with Row Function

    用函数列作密钥的加密方法

  13. A good crypto scheme should be secure and efficient .

    一个好的密码方案除了要求是安全的,还应该是高效的。

  14. Crypto objects are created and configured into the processing rules .

    将创建Crypto对象并将其配置到处理规则中。

  15. Analysis of security of RSA crypto system

    RSA密码体制安全性分析

  16. Researching on Crypto Service-Provider Applied in Secure Digital Documents Managing System

    密码服务提供程序在安全数字化档案管理系统中的应用研究

  17. The design techniques are used to obtain secure and practical crypto schemes to guarantee information security .

    其中,设计技术用来寻求安全实用的密码算法(协议)确保信息的安全。而分析技术则被用于挖掘出任何可能削弱算法安全性的弱点,然后推导出新的设计原则。

  18. He even said his shoe brand would accept the flagship crypto .

    他甚至要以密码学作为他自创品牌旗舰球鞋的主题。

  19. Analysis of the Attacks Based on the Modulus n in RSA Public-key Crypto System

    RSA公钥密码体制中基于模数n攻击分析

  20. Design and Implementation of AES Crypto Coprocessor Based on FPGA

    基于FPGA的AES密码协处理器的设计和实现

  21. Write all data to the crypto stream and flush it .

    写的所有数据流的加密和刷新它。

  22. Then we show an algorithm design of the elliptic curve crypto based on Galois field .

    设计完成了一种基于有限域的椭圆曲线加密算法,主要包括适合于168bit椭圆曲线加密的有限域乘法、加法、除法器的实现;

  23. VLSI Design of a Low Cost and Reconfigurable RSA Crypto - Processor

    低成本的密钥长度可配置RSA密码协处理器VLSI设计

  24. It is a common measure that employing some mathematical hard problems in crypto scheme designing .

    把密码方案的安全基础建立在已知的数学难题上是密码设计常用的一种方法。

  25. The partial print didn 't match anyone at the crypto unit .

    部分的指纹和秘密小组中的人都不匹配。

  26. RSA - Probabilistic Public Key Crypto system

    RSA-概率公钥密码体制

  27. Implementation of RSA Crypto Chip Based on FPGA

    RSA密码芯片的FPGA实现

  28. The Research of General Parallel Vector Crypto Coprocessor

    通用并行向量密码处理器研究

  29. Start with two text boxes : one for unencoded text and one for the Crypto .

    首先创建两个文本框:一个用于未编码的文本,另一个用于密码。

  30. All you would need to change is the Key size , IV size and the Crypto Service Provider .

    所有你需要改变的关键在于规模,四大小和加密服务提供程序。