1.
A Method of Generating Seed Key Schedule Based on Chaotic Sequence
基于混沌序列的种子密钥表生成方法
2.
The Compromised Key List for the certificate has expired. Reload a new Compromised Key List.
此证书的折衷密钥列表已过期。重新装入一个新的折衷密钥列表。
3.
The Compromised Key List has an invalid format.
此折衷密钥列表的格式无效。
4.
Allow key exchange only with key encryption (key encipherment)
只在密钥加密时允许密钥交换(密钥译码)
5.
Allow key exchange without key encryption (key agreement)
在密钥不加密时允许密钥交换(密钥协定)
6.
The Compromised Key List for this site's certificate has expired. Reload a new Compromised Key List.
此网站的证书的折衷密钥列表已过期。重新装入一个新的折衷密钥列表。
7.
The Compromised Key List for this site's certificate is not yet valid. Reload a new Compromised Key List.
此网站证书的折衷密钥列表尚未有效。请重新装入一个新的折衷密钥列表。
8.
No Compromised Key List for this site's certificate has been found. You must load the Compromised Key List before continuing.
无法为此网站的证书找到的"折衷密钥列表"。在继续执行之前,必须装入折衷密钥列表。
9.
No Compromised Key List for the certificate has been found. You must load the Compromised Key List before continuing.
找不到此证书的"折衷密钥列表"。在继续执行之前,必须装入折衷密钥列表。
10.
The Compromised Key List you are trying to load has an invalid format.
您试图装入的折衷密钥列表的格式无效。
11.
Theory analysis show s that this kind of key code dis tribution's p rotocol is absolutely safe.
理论分析表明这种密钥分配协议是安全可靠的。
12.
"Generating cryptographic key and setting key protection...
"正在生成加密密钥并设置密钥保护...
13.
The private key system is also called the single key system, in which the encryption process is the same as the decryption process.
私钥体制又称单钥体制,其加密密钥和解密密钥相同;
14.
encryption with an 80-bit key
加密,使用 80 位密钥
15.
- Public key encryption and authenticatio
公开密钥加密与验证
16.
Public Key Cryptography
公共电子密钥加密法
17.
"Use this string to protect the key exchange (preshared key):
"此字串用来保护密钥交换(预共享密钥):
18.
master key variant key data set
主密钥的变形密钥数据集