快好知 kuaihz


cipher造句
91 The cipher text string is then passed to the getCipherDataDoc private method. 92 From a corner of the room, the old ecstatic gaucho - in whom Dahlmann saw a summary and cipher of the South (his South) - threw him a naked dagger, which landed at his feet. 93 If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key. 94 Aim How to produce non - periodic sequence cipher by seed key. 95 This paper is devoted to design a variable size block cipher (VSBC) based on the first-order hyperbolic equation with mixed initial-boundary conditions. 96 Investigation shows that the scheme is provable security under the blockwise adaptive attack model if the underlying block cipher is a pseudorandom permutation. 97 This paper presents the relationship between the round key and the cipher key of the AES algorithm and proposes a mathematical model of the key expansion of AES algorithm. 98 I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters. 99 This paper presents the techniques to support encryption in ATM/SDH network and the cipher management protocol. Also a new approach to realize link encryption is proposed. 100 Pseudo-random sequence, as a code, has broad applications in spread spectrum communication, stream cipher, channel coding. 101 In cryptography, an early example of monoalphabetic, or substitution cipher used in the Gallic wars. 102 The paper describes the RSA arithmetic about cipher, showing the exponential expression of it. 103 At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data. 104 Bases on advantages of the old mechanical lock, and the new type cipher lock with Computerized Control System is designed. 105 The paper describes the RSA arithmetic about cipher, and shows the exponential expression of it. 106 The objective of this article is to find a mechanism for breaking a cipher text . 107 The research of "the cipher" in the 17 years rural novels is deficient in the critical field. 108 Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. It can ensure data security. 109 He got his mistress , Madeleine Bayard , the job of cipher officer on board ship. 110 Cryptograph :a system of secret or cipher writing; a cipher. 111 You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks. 112 At last they managed to puzzle out the meaning of the cipher. 113 The cipher took me three weeks before I hit it. 114 If they do not have a cipher suite in common, then secure communication is not possible and CICS closes the connection. 115 American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. 116 Amount of ceramic tile of the computation that press a plan uses ceramic tile gross plus place of cipher out of normal construction loss. 117 The research should focus on the designing mechanism of cipher systems irrelevant to the computing power, and the cipher systems with provable safety. 118 The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data. 119 The so - called aloof cabinet was a cipher in algorism. 120 The Foreign Office have been pushing us for months to get something on the cipher.