网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_cipher
释义

Examples of cipher


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
In my judgment it is exactly eight ciphers too many.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
On the other hand, can one imagine a better way to create meaningless ciphers than to allow the party leaderships to appoint and re-appoint people?
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
In the past, fire authorities have often been seen as rubber-stamping ciphers that merely approve what their chief officers want to do.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Just one word or one group of ciphers—even one letter—lost can mean the nullification of months, perhaps even years, of cryptographic work.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Elected councils have been turned into mere ciphers.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
They were mere ciphers and cogs in the state machine and there was absolutely no confidence in their professional ability or integrity.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The whole trend of our modern society is away from the treatment of people as ciphers and towards recognition of their individual rights and claims.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
I am more and more alarmed every day at the degree to which we are becoming ciphers.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The worker and the consumer are becoming ciphers.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Members would not then be reduced to mere ciphers, as they are now.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
They feel that they are no longer counted as human souls but as ciphers and that their energies and abilities are being exploited.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Are they to be mere ciphers in a mathematical calculation?
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
We are not talking about ciphers, about people who are born cheats and who know how to get the best out of the system.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
They are not ciphers or rubber stamps; they are human beings.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
We do not know enough about unemployment, and to regard unemployed people as mere ciphers or units of economic possibility is nonsense.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
One is dealing with human beings, not with ciphers in a commercial calculation.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
What was wanted then was an immediate decision, not the delay which coding and ciphering and telegraphing must inevitably produce.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
No really useful scientific work on ciphers can be done without cryptanalysis.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The motive is that women may belong to themselves, that they may own their property, and they may not be in the eyes of the law economic ciphers.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
We have become nothing but ciphers.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
In the history of cryptography, early ciphers, implemented using pen-and-paper, were routinely broken using ciphertexts alone.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In these ciphers, plaintext letters map to more than one ciphertext symbol.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Most countries responded promptly by changing (and generally improving) their ciphers and codes, forcing other nations to start over in reading their signals.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
All such ciphers are easier to break than once believed, as substitution alphabets are repeated for sufficiently large plaintexts.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The constructions are typically built from standard primitives such as block ciphers and cryptographic hash functions.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There is no record at that time of any techniques for the solution of simple substitution ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The technique encrypts pairs of letters ("digraphs"), and thus falls into a category of ciphers known as polygraphic substitution ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
As a student of ciphers, he mentioned among his enthusiasts many eminent gentlemen and great princes.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Ciphers work at the level of individual letters, or small groups of letters, or even, in modern ciphers, with individual bits.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Chosen-ciphertext attacks have implications for some self-synchronizing stream ciphers as well.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
He was skilled in ciphers, but indiscreet, and at one time his life seems to have been in danger.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Polyalphabetic ciphers use several different enciphering alphabets and change between them at some interval, usually after every letter.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
His work also impacted modern designs of secret-key ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
As such, it has the weaknesses of all substitution ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A third class of information theory codes are cryptographic algorithms (both codes and ciphers).
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Dvorak encoding, like other monoalphabetic encryption ciphers, is a very simple encoding and provides a very weak level of security.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Block ciphers have one or more block size(s), but during transformation the block size is always fixed.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The language used here, which emphasizes the severity of the injustices involved, was not the simple cipher of ruling concerns.
Null ciphers can also be used to hide ciphertext, as part of a more complex system.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
We may instead find a number of possible keys, although this is still a significant breach of the cipher's security.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, it should not be assumed that government/military ciphers must be kept secret to maintain security.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Cryptosystems employed include transposition, dinome, and rotor-based ciphers and a one-part code.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The cipher's strength rests on a strong mixing of its inner state between two consecutive iterations.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
One-way compression functions are often built from block ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, using only a few alphabets left the ciphers vulnerable to attack.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In software-efficient ciphers, it can be done by interleaving arithmetic operations with byte-swapping operations and to a small degree with bitwise rotation operations.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In this mode, book ciphers are more properly called codes.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Not all governments will allow the use of such strong ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Blowfish is notable among block ciphers for its expensive key setup phase.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Consequently, both ciphers still need to be broken.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A cryptanalyst must break both ciphers to get any information.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Hooke was apt to use ciphers and guard his ideas.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The method is used as an aid to breaking classical ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, there is an important distinction between codes and ciphers in technical work; it is, essentially, the scope of the transformation involved.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Ed25519 is targeted to provide attack resistance comparable to quality 128-bit ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Linear cryptanalysis is one of the two most widely used attacks on block ciphers; the other being differential cryptanalysis.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Attacks have been developed for block ciphers and stream ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Important information such as enemy plans, ciphers or rutters might also be recovered.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Diplomats had long used codes and ciphers for confidentiality and to minimize telegraph costs.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
General-purpose ciphers tend to have different design goals.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In classical cryptography, ciphers were distinguished from codes.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In some cases the terms codes and ciphers are also used synonymously to substitution and transposition.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
He kept extensive journals over a period of several decades, many of which were written in letter-substitution ciphers of his own invention.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, modern block ciphers are only partially one-way.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Depending on the size of the rotor, this may or may not be more secure than hand ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Relative asemic writing is a natural writing system that can be read by some people but not by everyone (e.g. ciphers).
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Many writers claimed to have invented unbreakable ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Thus, efficiency is the most important additional design criterion for professional ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Symmetric key ciphers (also referred to as secret key ciphers) are called such because the same key is used for both encryption and decryption.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Block ciphers operate on fixed-length groups of bits, called blocks, with an unvarying transformation.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
They also may have been used as ciphers for discreet or secret communication.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
They are concerned with the emergence and dissolution of ciphers in infinite spaces.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Therefore, it does not affect the real-world security of block ciphers in the near future.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, symmetric ciphers can not be used for non-repudiation purposes except by involving additional parties.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
One of his first challenges was to phase out double transposition ciphers using keys based on preselected poems.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In fact, the two ciphers were often confused, and both were sometimes called "le chiffre indchiffrable".
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The existence of such a cipher as a character is irritating and would only be acceptable if the story were funny.
A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Many people solve such ciphers for recreation, as with cryptogram puzzles in the newspaper.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Many specialized authenticated encryption modes have been developed for use with symmetric block ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The players face simple substitution and transposition ciphers, graphic and multimedia ciphers, object with the clue hidden inside that must be destroyed, and more.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Most ciphers were ad-hoc methods relying on a secret algorithm, as opposed to systems based on a variable key.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Modern attacks on polyalphabetic ciphers are essentially identical to that described above, with the one improvement of coincidence counting.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Common constructions of stream ciphers are based on pseudorandom generators.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The development of cryptography has been paralleled by the development of cryptanalysis the breaking of codes and ciphers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Without ciphers and diplomatic bags, espionage and counter-espionage actions were likely to be circumscribed.
Refer to resources listed below to gain a thorough understanding of the principles behind stream ciphers.
Not all news organizations display this pattern of behaviour, nor are all journalists mere interchangeable ciphers in the propaganda battle.
Agriculture had a social function, producing 'real' wealth as opposed to the abstract account-book ciphers of purely monetary economics.
There were two main systems in use; transposition ciphers and substitution ciphers.
There were so many ciphers in use that the code breaker would have to try many techniques before they found the right one.
Refer to resources listed below to gain a thorough understanding of the principles behind block ciphers.
Encryption algorithms can be split into two general categories: block ciphers (which encrypt multiple characters at a time) and steam ciphers (which encrypt data character by character).
Various resources were investigated and plenty of information gathered about stream ciphers, which was subsequently analysed and written up in a format suitable for inclusion in the final report.
Codes are broken, face values questioned, ciphers exposed ; through the language of theatre are enacted painful and exuberant unfoldings of private lives, of public slanders and of capital treasons.
A wide variety of algorithms were examined - though it was noted there was a much wider choice of block ciphers than stream ciphers - and two from each category were selected.
Transposition ciphers involved taking a message and rearranging the letters in the message and substitution ciphers entailed replacing letters by other letters, or indeed groups of letters.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2024/12/23 2:08:32