Object that is initialized to the url identifier of the cryptographic algorithm used to generate the session key 对象,该对象被初始化为用来生成会话密钥的加密算法的url标识符。将
Describes how to map algorithm names to cryptographic classes and map object identifiers to a cryptographic algorithm 描述如何将算法名称映射到加密类以及如何将对象标识符映射到加密算法。
Again , let us remind you that using proprietary cryptographic algorithms , including hash functions , is usually a bad idea 再次提醒您,使用专用密码演算法,包括杂凑函数,通常是一个坏主意。
Describes how to map algorithm names to cryptographic classes and how to map object identifiers to a cryptographic algorithm 描述如何将算法名称映射到加密类以及如何将对象标识符映射到加密算法。
In this paper , we explain the theory of elliptic curves and discuss some work of design cryptographic algorithms and protocols 这种密码体制的诱人之处在于在安全性相当的前提下,可使用较短的密钥。
You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application 可以使用此方法确定选定的加密算法和强度是否满足您的应用程序的要求。
Public - key cryptographic algorithms use a fixed buffer size whereas secret - key cryptographic algorithms use a variable - length buffer 公钥加密算法使用固定的缓冲区大小,而私钥加密算法使用长度可变的缓冲区。
A security service is some type of data protection , and is independent of the mechanism or cryptographic algorithm by which it is implemented 安全服务是某种类型的数据保护,独立于实现服务的机制或加密算法。
And among the all of cryptographic algorithms , the rsa is the most widespread and securest public key algorithm in the world 而在密码算法领域, rsa公钥密码体制具有里程碑的意义,是应用范围最为广泛和安全性最高的密码算法。
For example , data can be encrypted using a cryptographic algorithm , transmitted in an encrypted state , and later decrypted by the intended party 例如,可以使用加密算法对数据进行加密,在加密状态下传输数据,然后由预定的接收方对数据进行解密。