cipher造句31 However, block cipher algorithms tend to execute more slowly than stream ciphers.
32 The block cipher coprocessor has been applied in a PCI-FPGA cipher card designed by the Information Security Technology Laboratory of Guangzhou University.
33 A differential cryptanalysis of the iterated block cipher based on the new round function is presented.
34 I every menstruation date is different, such can is cipher out safe period with crises?
35 According to MIMEprotocol, the key, digital signatUre and cipher text are packaged and processed at the both sides.
36 The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration.
37 This paper introduces a completely nonsingular matrix based substitution permutation network that can effectively improve the performance of the block cipher against linear cryptanalysis.
38 Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function.
39 The cipher message begins with a large 534 does it not?
40 Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
42 In many cipher system, the pseudo random sequence generator is an important part in system security.
43 The born of AES and the launching of NESSIE project, bring a new climax of block cipher research all over the world.
44 In this paper, a general cryptograph system called GCS is presented. Its core is a general cipher de-vice based on the technique of coding the algorithm.
45 Before we can encrypt, we need to know the size of the buffer required for the cipher text .
46 The acceleration mechanism can be used in acceleration of clock-controlled sequence generator and key preset of stream cipher generator.
47 Therefore, we can use this to build up a cipher text communication pipe for data transferring between clients and servers of database systems to preserve data confidentiality and integrity.
48 According to the property that all states of a certain cellular automata can build a permutation group, we can design block cipher based on this property.
49 Pseudo random sequence has broad applications in stream cipher , channel coding, and spread spectrum communication.
50 Based on the encryption principle of affine cipher, a frequency transition function of DFH is designed.
51 In order to keep pace with the accreditation of wireless network and cipher code, the wireless public key system is researched.
52 Determine the block size. If a block cipher is used.
53 A new block cipher is designed where the diffusion of matrix multiplication is combined with the confusion of specially designed matrix operation to encrypt information.
54 If you have duplicate blocks within your plain text stream, you will have duplicate blocks within your cipher text stream.
55 Probe into the design principle of cipher systems irrelevant to computing power, design cipher systems with provable safety, and analyze the defects of existent cipher systems.
56 This hidden information can be plain text, cipher text, or even images.
57 Firstly, this thesis researches the correlative design technology of USB Cipher Card.
58 Block cipher in output feedback mode is used to implement the end - to - end key stream generator.
59 IDEA encryption algorithm is data block encryption algorithm ( Cipher Block ) category.
60 The invention relates to a digital cipher code protection device, especially a grille window small display screen cipher code theft-proof device used for ATM and counter of bank.