词汇 | example_english_encryption-scheme |
释义 | encryption schemecollocation in Englishmeanings of encryptionand schemeThese words are often used together. Click on the links below to explore the meanings. Or, see other collocations with scheme. encryption noun[U] uk /ɪnˈkrip.ʃən/ us /ɪnˈkrip.ʃən/ the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ... See more at encryption scheme noun[C] uk /skiːm/ us /skiːm/ an organized plan for doing something, especially something dishonest or illegal that will bring a good result ... See more at scheme Examples of encryption schemeThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. There are ongoing maintenance procedures which are a requirement of any encryptionscheme. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 For technical reasons, an encryptionscheme usually uses a pseudo-random encryption key generated by an algorithm. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The homomorphic part of a fully homomorphic encryptionscheme can also be described in terms of category theory. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The goal of the attack is to gain some further information which reduces the security of the encryptionscheme. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The homomorphic properties of the encryptionscheme enable the worker to obtain an encryption of the correct output wire. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These communicate over a network, using a unique encryptionscheme for stealth and protection against detection or intrusion into the botnet. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In a secure asymmetric key encryptionscheme, the private key should not be deducible from the public key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Finally, he shows that any bootstrappable somewhat homomorphic encryptionscheme can be converted into a fully homomorphic encryption through a recursive self-embedding. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A questionable encryptionscheme has the property that real public keys are computationally indistinguishable from fake public keys when the private key is not available. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This period represents more than enough time for the encryptionscheme to be defeated by determined attackers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Informally speaking, a questionable encryptionscheme is a public key cryptosystem (3-tuple of algorithms) with two supplementary algorithms, forming a 5-tuple of algorithms. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In 2007 the encryptionscheme was overcome with a tool called "dvdcpxm". From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To use a symmetric encryptionscheme, the sender and receiver must securely share a key in advance. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In an encryptionscheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. An intuitive approach to converting a deterministic encryptionscheme into a probabilistic one is to simply pad the plaintext with a random string before encrypting with the deterministic algorithm. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Assuming that a deterministic encryptionscheme is going to be used, it is important to understand what is the maximum level of security that can be guaranteed. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Note that secure here has a precise mathematical meaning, and there are multiple different (meaningful) definitions of what it means for an encryptionscheme to be secure. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryptionscheme, large computational resources and skill are required. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Want to learn more? Go to the definition of encryption Go to the definition of scheme See other collocations with scheme |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。