cryptogram
英
美
n. 密码(电)文;暗号
复数:cryptograms
COCA.38785
英英释义
noun
- a piece of writing in code or cipher
双语例句
- In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced.
本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。 - In this paper, through analyzing the advantages and security of RSA encryption system and chaotic encrypt, a new grouping double-key cryptogram scheme is presented.
在分析了RSA公钥加密系统和混沌加密各自的优点及其存在的安全问题的基础上,提出了一种新的分组双密密钥密码方案。 - The design of the system also uses the technology of information network security and the theory of the cryptogram.
同时,系统在设计上充分利用了信息网络安全技术以及密码理论。 - Cryptogram is the core of information security, chaos-based Encryption is a new research direction of Cryptogram.
密码是信息安全的核心,混沌密码是密码学的一个新的研究方向。 - It is necessary to mix address code in transform process of input TOD as block cryptogram.
地址码必须如分组密码方法那样,混淆在对TOD输入的变换过程之中。 - It studied the security technology related to information system, included cryptogram technology, Fire Wall technology, database security technology, digital signature, authentic technology and VPN technology.
研究了信息系统相关的信息安全技术,包括密码技术、防火墙技术、数据库安全技术、数字签名、认证技术、VPN技术。 - In security communication, the cryptogram generator is a key device.
在保密通信中,最关键的是要有一个可靠的密码产生器。 - In the scroll stochastic synchronous jump code way to recognize cryptogram and possess the characteristic, cryptogram cannot be decoded and a key used for multi-lock.
采用滚动式随机同步跳码方式进行密码识别,具有密码不可破解和一钥多锁等特点,彻底杜绝了丢油事件的发生。 - The model of USB Security Key was developed, and each part of the model was studied and analyzed. A conclusion was drawn that the most important thing in designing USB Security Key was the establishment of cryptogram protocol and the selection of cryptogram method.
在此基础上,构建了USB安全钥的系统模型,并对此模型的各部分进行了分析和研究,建立了USB安全钥中最重要的密码协议,选择了适用的密码方法。 - This text has discussed that the digital watermark anti-counterfeit of the products is designed, the means studied with the cryptogram, analyses and proved each link that is designed, and put forward author's unique opinion.
文章讨论了产品的数字水印防伪设计,运用密码学的手段,对设计的各个环节进行了分析和论证,提出了作者独特的见解。
