the science of analyzing and deciphering codes and ciphers and cryptograms
双语例句
1. In cryptanalysis, a triple of successive letters.
密码分析中的一组三个连续字母。
youdao
2. The field that encompasses both cryptography and cryptanalysis.
包含加密技术和密码分析(学)两部分的学科领域。
youdao
3. Cryptanalysis: The analysis and deciphering of cryptographic writings or systems.
密码分析:对密码书写或密码系统的分析和译解。
youdao
4. Cryptanalysis of two different kinds of symmetric chaotic cryptosystems is presented.
分别对两种对称混沌密码系统进行了密码分析。
youdao
5. Fast correlation attack is one of the important cryptanalysis method for stream ciphers.
快速相关攻击是一种重要的序列密码分析方法。
youdao
6. Design and cryptanalysis on group signature is always the hotspot in the field of cryptography.
对群签名的设计与分析始终是密码学领域的一大热点。
youdao
7. Source code for all these algorithms is in the public domain and has undergone years of cryptanalysis.
为所有这些算法的来源代码在公众领域里和经受了密码学分析。
youdao
8. A differential cryptanalysis of the iterated block cipher based on the new round function is presented.
对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。
youdao
9. Design and cryptanalysis on group (blind) signature is always the hotspot in the field of cryptography.
对群(盲)签名的设计与分析始终是密码学领域的一大热点。
youdao
10. Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
youdao
11. An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.
在分组密码的设计中,提高分组密码的抗差分攻击性能是一个重要的课题。
youdao
12. With cryptanalysis, the fact that data is encrypted is obvious: You need only observe the data to determine whether it is encrypted.
使用隐写式密码解密,您需要观察数据并确定它是否加密。
youdao
13. Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology.
整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。
youdao
14. Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
youdao
15. Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.
最后,密码分析学的进步可以使任何加密机制或算法变得不再安全,因为总是有新奇的破解方法被找出来。
youdao
16. In this paper, the Sequential Probability Ratio Test (SPRT) is introduced to cryptanalysis to reduce the amount of keys needed in correlation attacks.
本文把序贯概率比检验引入到密码分析中,用来约减相关攻击所需的密钥量。
youdao
17. The cipher design combines the wide trail strategy and bit-slice technology that ensure the resistance AC against differential and linear cryptanalysis.
AC分组密码的设计结合了宽轨迹策略和比特块技术,以确保算法对差分密码分析和线性密码分析的安全性。
youdao
18. Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.
19. Therefore, using large completely nonsingular matrix based substitution permutation networks can effectively improve cipher security in relation to differential cryptanalysis.
指出了使用大规模的基于全奇异矩阵的代替置换网络可有效地提高分组密码抗差分密码分析的安全性。
youdao
20. During the Second World War Turing worked at Bletchley Park, Britain's code-breaking centre, and was for a time head of Hut 8, the section responsible for German naval cryptanalysis.
21. SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.
SPN结构是一种流行的分组密码总体结构;差分和线性分析是攻击分组密码的最强有力的方法。
youdao
22. In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.
给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
youdao
23. Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
24. The main problem of side- channel cryptanalysis is to grasp the in- formation leakage mechanism in chip, and to build information leakage model for leakage signal statistical analyzing.
其关键问题在于掌握芯片运行过程中泄漏信息的机理,进而建立统计分析泄漏信号的信息泄漏模型。
youdao
25. This paper introduces a completely nonsingular matrix based substitution permutation network that can effectively improve the performance of the block cipher against linear cryptanalysis.
论文介绍了一种基于全非奇异矩阵的代替置换网络,它可有效的提高分组密码抗线性密码分析的能力。
youdao
26. Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
27. Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.
28. Realizing this design provide not only one way for studying in theory. but also application for cryptanalysis in practice, it can analyse cipher and be regarded as a (assistant) tool of cryptanalysis.
29. Realizing this design provide not only one way for studying in theory. but also application for cryptanalysis in practice, it can analyse cipher and be regarded as a (assistant) tool of cryptanalysis.