cipher造句61 The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher.
62 It then calls the encryption method getEncryptedData, which returns a Base 64 encoded cipher text string.
63 All important plans were sent to the police in cipher.
64 I will not write down his real name even in this bothersome Yiddish - letter cipher.
65 Then a chaotic stream cipher based on the pseudo-random number generator is designed, which has high security, low cost and easy realization proved by some experiments.
66 Cryptography will be spread for the cipher text to achieve copyright protection.
67 Rijndael encryption algorithm is the grouping variable length block cipher.
68 It is very convenient to do cash withdrawal, accounts checking, cipher amending and funds allocating, etc.
69 In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages.
70 This was a kind of a motor cipher that you can encode into the muscle system and use to induce a variety of ideas in participants.
71 NATO experts believe that the contents of the cipher text description of the Russian general lack of troop combat capability to make up with nuclear weapons to force the Russian military.
72 DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
73 The part written in cipher – turned out after examination to be entirely unpublishable.
74 For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode.
75 Based on existing block ciphers and combined with characteristic of processor architecture, this paper has a research on high performance processor architecture for block cipher algorithms.
76 One of the cipher clerks came out and engaged our escort in animated conversation.
77 The technical documents on commercial cipher shall be kept by special persons who shall take corresponding confidentiality measures to prevent the divulgence of commercial cipher technologies.
78 To write ( a message, for example ) in code or cipher.
79 CBC The Cipher Block Chaining ( CBC ) mode introduces feedback.
80 The concept and design principle of reconfigurable cipher coprocessor are proposed in this paper.
81 Security and other performance are analysed, the probability of correct decipher of these Block error correcting cipher systems is also discussed in noise channel.
82 It accepts a Base 64 encoded cipher byte array, and decodes and decrypts it to return the clear data string.
83 I have declared a byte array named ivBytes, which will hold the initial vector bytes for each step of the cipher block chaining.
84 A symbol used in secret writing; a cipher or code.
85 In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.
86 It shifts the letter in the plain message n character backwards to get the cipher text.
87 Its cipher code is basically the golden standard of Internet security, and it doesn't sell subscriber lists.
88 The Enigma machine was an advanced electro - mechanical cipher machine developed in Germany after World War 1.
89 He was little more than a cipher who faithfully carried out the Fuehrer's commands.
90 One byte of cipher text is generated for every byte of plain text contained in the message.