1·The number that you choose to rotate your letters by is what we call in cryptography, a key.
你选择的旋转字母的数量就是我们在密码学中所说的密匙。
2·This mysterious property, known as entanglement, has far reaching application potential in information fields such as quantum cryptography, quantum computation and quantum teleportation.
这个神秘的“纠缠”性质,在通信领域具有深远的应用潜力,如量子密码学,量子计算和量子隐态传输。
3·This mysterious property, known as “entanglement”, has far reaching application potential in information fields such as quantum cryptography, quantum computation and quantum teleportation.
这个神秘的“纠缠”性质,在通信领域具有深远的应用潜力,如量子密码学 ,量子计算和量子隐态传输 。
4·While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.
虽然听起来这并不是什么了不起的事,但分解并找到一个离散对数的困难形成了大部分公用密钥密码学系统的基础,如果不是全部的话。
5·The service can be used by remote filesystems or other kernel services to manage cryptography, authentication tokens, cross-domain user mappings, and other security concerns.
远程文件系统和其他内核服务可以使用这个服务来管理密码学、身份验证标记、跨域用户映射和其他安全问题。
1·It would have ensured — through using strong cryptography and security tested mechanisms — that the tokens sent to the application were indeed genuine and not forged.
他应该确保——通过使用加强的密码系统和安全测试机制——发送到应用程序的标识确实是真实的,而非虚假的。
2·RSA public-key cryptography is based on this property of factorization.
RSA 公钥密码系统就是基于这种因数分解特性的。
3·To prevent e-cash from double-spending and unlimited increase in the records of databases, an improved offline e-cash system based on elliptic curve cryptography was proposed.
为防止电子现金重复花费和数据库记录无限制的膨胀问题,改进了现有的利用椭圆曲线密码系统构造的离线电子现金系统。
4·A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
5·Be signed with a strong name using standard public key cryptography.
使用标准公钥密码系统用强名称签名。