1.
Paths to keyrings and seed file for random generator.
# 生成密匙时密匙环和随机数种子文件的路径,没太大意思。
2.
Authorize SS and perform key exchange.
批准用户端设备接入,执行密匙交换。
3.
Kerberos authenticates the identity and encrypts their communications through secret-key cryptography.
KERBEROS 协议认证试图等录上网用户的身份,并通过使用密匙密码为用户间的通信加密。
4.
It's sort of like those probabilistic tests used to produce large prime numbers for public-key cryptography.
这类似于那些用来为公开密匙系统产生大质数的概率测试。
5.
Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption.
公开钥匙加密法解决了管理几个钥匙的问题,但是与常规加密相比,公开钥匙加密慢些。
6.
In a public-key cryptosystem, plaintext encrypted with the public key can only be deciphered with the private key from the same pair.
在公开密钥密码系统中,用明匙加密的普通文本只能由同一对钥匙中的秘密密钥解密。
7.
The message digest is encrypted with sender's private key.
报文摘要是用发送者的秘密钥匙加密的。
8.
Realization of Elliptic Curve Cryptography on USB Key
椭圆曲线密码算法在智能密码钥匙中的实现
9.
A fish of the family Polyodontidae, having a long paddle - shaped snout, especially Polyodon spathula of the Mississippi River basin.
白鲟,匙吻鲟匙吻鲟科的一种鱼,有长的桨状吸盘,特别是匙吻鲟密西西比河流域的这种鱼
10.
Key management in conventional encryption, however, is a problem because several files may be encrypted with different keys.
然而,常规加密中的钥匙管理是个问题,因为几个文件可用不同的钥匙加密。
11.
Mr Smith said proudly, @Look here! I have the key!
史密斯先生自豪地说:“看这儿!我带钥匙了
12.
fish of larger rivers of China similar to the Mississippi paddlefish.
产于中国大河的匙吻鲟,比密西西比河流域中的
13.
The game is up, the teacher knows who took the keys.
秘密泄露,一切都完了,老师知道谁拿了钥匙。
14.
Design and Implementation of Smart Key with the Function of Fingerprint Identification;
具有指纹识别功能的智能密码钥匙设计与实现
15.
Design and Implementation of CSP Based on Smart Card and USB Key;
基于智能卡和USB电子加密钥匙的CSP设计与实现
16.
With triple DES, each 64 bit block is encrypted under three different DES keys.
使用三重加密时,每个64位字块用三种不同的DES钥匙加密。
17.
When Franny receives the message from Zooey, she can decrypt the message with her secret key.
当弗兰妮接收到佐伊的报文,她就能用其秘密钥匙对报文解密。
18.
Conventional algorithms are symmetrical and rely on the same key for encryption and decryption.
常规算法是对称的,对于加密和解密都依赖于同一钥匙。