词汇 | example_english_cipher |
释义 | Examples of cipherThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. In my judgment it is exactly eight ciphers too many. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 On the other hand, can one imagine a better way to create meaningless ciphers than to allow the party leaderships to appoint and re-appoint people? From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 In the past, fire authorities have often been seen as rubber-stamping ciphers that merely approve what their chief officers want to do. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Just one word or one group of ciphers—even one letter—lost can mean the nullification of months, perhaps even years, of cryptographic work. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Elected councils have been turned into mere ciphers. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 They were mere ciphers and cogs in the state machine and there was absolutely no confidence in their professional ability or integrity. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The whole trend of our modern society is away from the treatment of people as ciphers and towards recognition of their individual rights and claims. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 I am more and more alarmed every day at the degree to which we are becoming ciphers. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The worker and the consumer are becoming ciphers. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Members would not then be reduced to mere ciphers, as they are now. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 They feel that they are no longer counted as human souls but as ciphers and that their energies and abilities are being exploited. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Are they to be mere ciphers in a mathematical calculation? From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 We are not talking about ciphers, about people who are born cheats and who know how to get the best out of the system. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 They are not ciphers or rubber stamps; they are human beings. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 We do not know enough about unemployment, and to regard unemployed people as mere ciphers or units of economic possibility is nonsense. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 One is dealing with human beings, not with ciphers in a commercial calculation. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 What was wanted then was an immediate decision, not the delay which coding and ciphering and telegraphing must inevitably produce. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 No really useful scientific work on ciphers can be done without cryptanalysis. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The motive is that women may belong to themselves, that they may own their property, and they may not be in the eyes of the law economic ciphers. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 We have become nothing but ciphers. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 In the history of cryptography, early ciphers, implemented using pen-and-paper, were routinely broken using ciphertexts alone. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In these ciphers, plaintext letters map to more than one ciphertext symbol. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Most countries responded promptly by changing (and generally improving) their ciphers and codes, forcing other nations to start over in reading their signals. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. All such ciphers are easier to break than once believed, as substitution alphabets are repeated for sufficiently large plaintexts. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The constructions are typically built from standard primitives such as block ciphers and cryptographic hash functions. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. There is no record at that time of any techniques for the solution of simple substitution ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The technique encrypts pairs of letters ("digraphs"), and thus falls into a category of ciphers known as polygraphic substitution ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As a student of ciphers, he mentioned among his enthusiasts many eminent gentlemen and great princes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Ciphers work at the level of individual letters, or small groups of letters, or even, in modern ciphers, with individual bits. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Chosen-ciphertext attacks have implications for some self-synchronizing stream ciphers as well. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He was skilled in ciphers, but indiscreet, and at one time his life seems to have been in danger. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Polyalphabetic ciphers use several different enciphering alphabets and change between them at some interval, usually after every letter. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. His work also impacted modern designs of secret-key ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As such, it has the weaknesses of all substitution ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A third class of information theory codes are cryptographic algorithms (both codes and ciphers). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Dvorak encoding, like other monoalphabetic encryption ciphers, is a very simple encoding and provides a very weak level of security. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Block ciphers have one or more block size(s), but during transformation the block size is always fixed. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The language used here, which emphasizes the severity of the injustices involved, was not the simple cipher of ruling concerns. Null ciphers can also be used to hide ciphertext, as part of a more complex system. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. We may instead find a number of possible keys, although this is still a significant breach of the cipher's security. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, it should not be assumed that government/military ciphers must be kept secret to maintain security. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Cryptosystems employed include transposition, dinome, and rotor-based ciphers and a one-part code. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The cipher's strength rests on a strong mixing of its inner state between two consecutive iterations. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. One-way compression functions are often built from block ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, using only a few alphabets left the ciphers vulnerable to attack. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In software-efficient ciphers, it can be done by interleaving arithmetic operations with byte-swapping operations and to a small degree with bitwise rotation operations. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In this mode, book ciphers are more properly called codes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Not all governments will allow the use of such strong ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Blowfish is notable among block ciphers for its expensive key setup phase. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Consequently, both ciphers still need to be broken. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A cryptanalyst must break both ciphers to get any information. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Hooke was apt to use ciphers and guard his ideas. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The method is used as an aid to breaking classical ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, there is an important distinction between codes and ciphers in technical work; it is, essentially, the scope of the transformation involved. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Ed25519 is targeted to provide attack resistance comparable to quality 128-bit ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Linear cryptanalysis is one of the two most widely used attacks on block ciphers; the other being differential cryptanalysis. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Attacks have been developed for block ciphers and stream ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Important information such as enemy plans, ciphers or rutters might also be recovered. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Diplomats had long used codes and ciphers for confidentiality and to minimize telegraph costs. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. General-purpose ciphers tend to have different design goals. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In classical cryptography, ciphers were distinguished from codes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In some cases the terms codes and ciphers are also used synonymously to substitution and transposition. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He kept extensive journals over a period of several decades, many of which were written in letter-substitution ciphers of his own invention. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, modern block ciphers are only partially one-way. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Depending on the size of the rotor, this may or may not be more secure than hand ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Relative asemic writing is a natural writing system that can be read by some people but not by everyone (e.g. ciphers). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Many writers claimed to have invented unbreakable ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Thus, efficiency is the most important additional design criterion for professional ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Symmetric key ciphers (also referred to as secret key ciphers) are called such because the same key is used for both encryption and decryption. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Block ciphers operate on fixed-length groups of bits, called blocks, with an unvarying transformation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. They also may have been used as ciphers for discreet or secret communication. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. They are concerned with the emergence and dissolution of ciphers in infinite spaces. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Therefore, it does not affect the real-world security of block ciphers in the near future. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, symmetric ciphers can not be used for non-repudiation purposes except by involving additional parties. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. One of his first challenges was to phase out double transposition ciphers using keys based on preselected poems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In fact, the two ciphers were often confused, and both were sometimes called "le chiffre indchiffrable". From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The existence of such a cipher as a character is irritating and would only be acceptable if the story were funny. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Many people solve such ciphers for recreation, as with cryptogram puzzles in the newspaper. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Many specialized authenticated encryption modes have been developed for use with symmetric block ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The players face simple substitution and transposition ciphers, graphic and multimedia ciphers, object with the clue hidden inside that must be destroyed, and more. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Most ciphers were ad-hoc methods relying on a secret algorithm, as opposed to systems based on a variable key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Modern attacks on polyalphabetic ciphers are essentially identical to that described above, with the one improvement of coincidence counting. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Common constructions of stream ciphers are based on pseudorandom generators. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The development of cryptography has been paralleled by the development of cryptanalysis the breaking of codes and ciphers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Without ciphers and diplomatic bags, espionage and counter-espionage actions were likely to be circumscribed. Refer to resources listed below to gain a thorough understanding of the principles behind stream ciphers. Not all news organizations display this pattern of behaviour, nor are all journalists mere interchangeable ciphers in the propaganda battle. Agriculture had a social function, producing 'real' wealth as opposed to the abstract account-book ciphers of purely monetary economics. There were two main systems in use; transposition ciphers and substitution ciphers. There were so many ciphers in use that the code breaker would have to try many techniques before they found the right one. Refer to resources listed below to gain a thorough understanding of the principles behind block ciphers. Encryption algorithms can be split into two general categories: block ciphers (which encrypt multiple characters at a time) and steam ciphers (which encrypt data character by character). Various resources were investigated and plenty of information gathered about stream ciphers, which was subsequently analysed and written up in a format suitable for inclusion in the final report. Codes are broken, face values questioned, ciphers exposed ; through the language of theatre are enacted painful and exuberant unfoldings of private lives, of public slanders and of capital treasons. A wide variety of algorithms were examined - though it was noted there was a much wider choice of block ciphers than stream ciphers - and two from each category were selected. Transposition ciphers involved taking a message and rearranging the letters in the message and substitution ciphers entailed replacing letters by other letters, or indeed groups of letters. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。