cryptograph

  • n.密码;密码(式打字)机
  • v.译成密码
cryptographcryptograph

noun

1
a device for deciphering codes and ciphers
2
a piece of writing in code or cipher
Synonym: cryptogram secret writing
3
a secret method of writing
Synonym: cipher cypher secret code

数据来源:WordNet

  1. Research and Application of Data Cryptograph Coding Technology in Network Communication

    数据密码编码技术在网络通信中的研究及其应用

  2. A Network Security System Based on the Public Key Cryptograph

    基于公钥密码的一种网络安全系统

  3. Design and application of " One - group - one - cipher " Cryptograph

    一组一密密码方案的设计与实现

  4. Design and implementation of control system of computational node in grid for cryptograph computing

    密码计算网格的计算节点控制系统设计与实现

  5. A Neural Network Method for Deciphering the Public Key Cryptograph

    破译公钥密码的一种神经网络方法

  6. Then discusses the encryption algorithms and applications of computer cryptograph .

    接下来讨论了现代计算机密码学中各种加密算法及其在PKI中的应用。

  7. Design and Implementation of Elliptic Curve Cryptograph in Prime Field on Smart Card

    素数域椭圆曲线密码在智能卡上的设计与实现

  8. Cryptograph computing needs great computing ability . The grid computing is a new computational technology .

    密码计算需要强大的计算能力,而网格计算作为一种新型有效的计算技术,能广泛集合网络上的资源形成一台虚拟的超级计算机。

  9. A Method of Data Tamper Locating and Recovery by Using Digital Fingerprint and Cryptograph

    基于指纹密文的数据篡改定位与恢复方法

  10. Cryptograph of block encryption appear one bit error , whole block cannot comeback .

    块加密的密文出现一位错误,整个块都不可能正确解密。

  11. The distributed computing for some other cryptograph computing tasks are carried out by the system .

    此系统在DES穷举攻击实验中取得了非常好的效果,其它一些密码计算任务类似地也可用此系统分布式地实现。

  12. Archaeological Studies of Chinese Music and Military Cryptograph

    中国乐曲考古学与军事密码学的比较

  13. This approach provides a set of inference rules for reduction and analysis of signature and cryptograph .

    新方法中的推导规则既简单便捷同时又具有分析签名和分析密文的能力。

  14. The symmetrical key cryptograph system have the single key to implement encryption and decryption fast .

    公开密钥密码体制则拥有公开密钥和私有密钥,加、解密过程不同。

  15. The Server access DBMS on behalf of Application and sends back the results in cryptograph .

    服务器接收请求后执行对数据库的真正访问,然后把访问结果加密后返回给客户端。

  16. Writing module encrypts the data to cryptograph and write them on USB storage equipment .

    对于那些需要通过USB接口写回存储设备的数据,写入模块把明文数据进行加密,最后把密文数据写入USB存储设备。

  17. Cryptograph : a system of secret or cipher writing ; a cipher .

    密码:一种秘密的或用密码书写的系统;密码。收藏。

  18. The key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph .

    这种方案的核心思想是在传输效率和传输保密性上取得更加实用性的平衡。

  19. Cryptograph Protection for Databases The Encoding of Database against classified Inquiry for Coded Administration Documents

    数据库的密码保护面向密级公文分级查询的数据库加密方法

  20. The study on the theory and design method of chaotic cryptographic technique will provide new clues and directions for cryptograph .

    研究混沌密码技术的理论和设计方法,可以为密码学的研究提供新的思路和发展方向。

  21. Efficient VLSI Design for Elliptic Curve Cryptograph

    高效椭圆曲线密码芯片的VLSI设计

  22. A digital watermarking signature-authentication based on elliptic curve cryptograph

    基于椭圆曲线的数字水印签署-认证

  23. Cryptograph Sending Based on the ECC Discrete Logarithm

    基于椭圆曲线离散对数认证的密文传送

  24. At past , data communication was mostly carried by router and switch , and security was carried by special cryptograph machine .

    过去数据通信功能由路由器或交换机承担,而安全功能则由专门的加密机承担。

  25. But the cryptograph algorithms cost too much CPU time , which decrease the throughput of the VPN Gateway .

    但是加密算法占用大量的CPU资源,降低了VPN网关的吞吐量。

  26. In addition , the existing of quantum non-cloning theory leads to the birth of quantum cryptograph .

    再者,由量子态不可克隆的特性产生了量子密码学。

  27. Reading module read the cryptograph from USB and decrypt , submit the decrypted data to user process .

    文件数据读取模块对于那些来源于USB接口的密文数据,自动进行相关的解密操作,并最终把明文页面提交给上层的用户进程。

  28. It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol .

    利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。

  29. The paper analyzed some computing tasks correlative with Cryptograph algorithms , and discussed some Cryptograph algorithms ' demand for new computational technology .

    文章通过对部分密码学相关的计算任务的分析,讨论了部分密码计算任务对计算技术的需求。

  30. This system need cryptograph text of office documents as input objects and is based on full-text indexing and retrieve using natural languages .

    该系统以机关公文密文文本数据为处理对象、基于全文标引、使用自然语言进行检索。