cryptogram

  • n.密码;密码(电)文;暗号
cryptogramcryptogram

noun

1
a piece of writing in code or cipher
Synonym: cryptograph secret writing

数据来源:WordNet

  1. A government uses a cryptogram or secret code .

    政府使用密码或暗号。

  2. He regarded the universe as a cryptogram set by the Almighty .

    他将宇宙视为上帝用密文书写的文件。

  3. Research and Application of Cryptogram Technology in Network Security

    网络安全中的密码技术研究及其应用

  4. Cryptographic algorithm and key are the very important part of cryptogram technology .

    密钥和密码算法的安全是密码卡的核心和关键。

  5. The ECC and classical public key cryptogram system are compared .

    比较了ECC与经典公钥密码体系间的优劣;

  6. In security communication , the cryptogram generator is a key device .

    在保密通信中,最关键的是要有一个可靠的密码产生器。

  7. This system of confidentiality is realized by cryptogram system .

    本系统通过数字签名来实现这一功能。

  8. The key technology to guarantee the security of electronic commerce is cryptogram .

    保证电子商务安全的关键技术是密码技术。

  9. This paper summarizes the development and applications of information security technologies , especially the cryptogram technology .

    文章综述信息安全技术,特别是密码技术的发展与应用。

  10. The design of the system also uses the technology of information network security and the theory of the cryptogram .

    同时,系统在设计上充分利用了信息网络安全技术以及密码理论。

  11. In principle , the methods of modern cryptogram system are suitable for the digital image encryption .

    可见,现代密码体制同样适用于数字图像保密。

  12. Cryptogram programming of confidential information is an effective tool for ensuring information security .

    机密信息的密码化是保证信息安全的一种有效手段。

  13. Smart Cryptogram & Click Motivity Technology to Convoy for System Security

    为系统安全护航的键击动力技术&智能密码

  14. The security program builds largely upon sound cryptogram arithmetic and secure key management .

    密码算法的安全性很大程度上依赖于密钥的安全性。安全设计离不开密码算法的支持和安全的密钥管理。

  15. The Construction of Stream Cryptogram by Using Chaos

    利用混沌构造流密码

  16. Progress in Quantum Cryptogram Communication Research

    量子密码通信研究进展

  17. Computer Cryptogram Algorithms and the Implementation Based on C-language

    计算机密码算法与C语言实现

  18. High performance cryptogram server provides a safe , highly effective platform of cryptogram programming of information .

    高性能密码服务器提供了一个安全、高效的信息密码化平台。

  19. The development and application of information technology accelerate information security , cryptogram arith-metic is important to information security .

    信息技术的发展与应用促进了信息安全不断的延伸,在信息安全技术中安全的密码算法是最重要的。

  20. In this thesis , the basic concepts of cryptogram including number theory and modular arithmetic are introduced .

    本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。

  21. Improved Digital Signature Cryptogram Agreement Using Hash

    利用Hash函数改造的数字签名密码协议

  22. Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function .

    加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。

  23. According to its feature , we can design some cryptogram algorithms which are adapted to many kinds of network .

    根据其性质可以设计出适用于各种网络的密码算法。

  24. VPN technology is a virtual private network technology which use the cryptogram knowledge in the establishment of open public networks .

    VPN技术是利用有关密码学知识在开放的公共网络上建立虚拟专用网络的技术。

  25. It is necessary to mix address code in transform process of input TOD as block cryptogram .

    地址码必须如分组密码方法那样,混淆在对TOD输入的变换过程之中。

  26. Cryptogram is the core of information security , chaos-based Encryption is a new research direction of Cryptogram .

    密码是信息安全的核心,混沌密码是密码学的一个新的研究方向。

  27. The information security technology relates to a variety of areas , but the cryptogram technology is the core of all security technologies .

    尽管安全技术涉及的范围十分广泛,但密码技术是各种安全技术的核心。

  28. Communication manager , which is established in the connection of TCP by cryptogram , can transmit .

    通信管理器是用密文方式建立在TCP连接上的传输。

  29. Salary Management and Cryptogram with Microcomputer

    微机工资管理及保密措施

  30. Software and data 's safeguard measure should strengthen cryptogram verify , purview control , graphics technique and data encrypt technique .

    软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。