网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_encryption-scheme
释义

encryption scheme

collocation in English

meanings of encryptionand scheme


These words are often used together. Click on the links below to explore the meanings. Or, see other collocations with scheme.
encryption
noun[U]
uk /ɪnˈkrip.ʃən/ us /ɪnˈkrip.ʃən/
the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ...
See more at encryption
scheme
noun[C]
uk /skiːm/ us /skiːm/
an organized plan for doing something, especially something dishonest or illegal that will bring a good result ...
See more at scheme


Examples of encryption scheme


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
There are ongoing maintenance procedures which are a requirement of any encryptionscheme.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
For technical reasons, an encryptionscheme usually uses a pseudo-random encryption key generated by an algorithm.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The homomorphic part of a fully homomorphic encryptionscheme can also be described in terms of category theory.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The goal of the attack is to gain some further information which reduces the security of the encryptionscheme.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The homomorphic properties of the encryptionscheme enable the worker to obtain an encryption of the correct output wire.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These communicate over a network, using a unique encryptionscheme for stealth and protection against detection or intrusion into the botnet.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In a secure asymmetric key encryptionscheme, the private key should not be deducible from the public key.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Finally, he shows that any bootstrappable somewhat homomorphic encryptionscheme can be converted into a fully homomorphic encryption through a recursive self-embedding.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A questionable encryptionscheme has the property that real public keys are computationally indistinguishable from fake public keys when the private key is not available.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
This period represents more than enough time for the encryptionscheme to be defeated by determined attackers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Informally speaking, a questionable encryptionscheme is a public key cryptosystem (3-tuple of algorithms) with two supplementary algorithms, forming a 5-tuple of algorithms.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In 2007 the encryptionscheme was overcome with a tool called "dvdcpxm".
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
To use a symmetric encryptionscheme, the sender and receiver must securely share a key in advance.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In an encryptionscheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
An intuitive approach to converting a deterministic encryptionscheme into a probabilistic one is to simply pad the plaintext with a random string before encrypting with the deterministic algorithm.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Assuming that a deterministic encryptionscheme is going to be used, it is important to understand what is the maximum level of security that can be guaranteed.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Note that secure here has a precise mathematical meaning, and there are multiple different (meaningful) definitions of what it means for an encryptionscheme to be secure.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryptionscheme, large computational resources and skill are required.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition of encryption
Go to the definition of scheme
See other collocations with scheme
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2024/12/22 21:03:52