Information technology - security techniques - procedures for the registration of cryptographic algorithms 信息技术.安全技术.加密算法注册程序
The interfering signal is produced by cryptographic algorithm , with good restoration resistance 干扰信号由密码算法产生,具有良好的抗还原性能。
This implementation is not part of the windows platform fips - validated cryptographic algorithms 此实现不是windows平台fips验证的加密算法的一部分。
Side - channel attacks are serious practical threat against implementation of cryptographic algorithms 摘要边信道攻击是一种对密码算法实现的有效的攻击。
Individual csps may have different cryptographic algorithms to provide various levels of security 不同的csp可能使用不同的加密算法以便提供各种安全等级。
Moreover , the method of choosing and using cryptographic algorithms fail to make customers feel safe 密码算法的选择和使用过程也不能为用户提供足够的安全信心。
The xml encryption specification lists a number of required and optional cryptographic algorithms including Xml加密规范列出了许多必需的和可选的密码术算法,包括:
One important aspect of the cryptographic algorithms localization is to eliminate the suspicion of a trapdoor 密码算法本土化的一个重要方面是消除密码算法存在陷门的忧虑。
Delegate determines whether authentication succeeds . the security protocol and cryptographic algorithms are already selected when the 委托的方法时已经选择安全协议和加密算法。
Method . create an object that implements a class of cryptographic algorithms such as a symmetric block cipher by calling the 方法,创建实现该类加密算法(如对称块密码)的对象。