ciphers

英 [ˈsaɪfəz] 美 [ˈsaɪfərz]

n.  密码; 暗号; 无足轻重的人; 无关紧要的东西; (姓名首字母的)拼合字,花押
cipher的复数



柯林斯词典

  1. N-COUNT 密码;暗号
    A cipher is a secret system of writing that you use to send messages.
    1. ...converting their messages into ciphers.
      把他们的信息转换成密码
    2. ...a cipher clerk.
      译电员
  2. N-COUNT 无足轻重的人;走狗;小兵小卒
    If you describe someone as a cipher, you mean that they have no power and are used by other people to achieve a particular purpose.
    1. He was little more than a cipher who faithfully carried out the Fuehrer's commands.
      他只不过是个走狗,忠实执行元首的命令。

双语例句

  1. Unfortunately, prior to V7, the default SSL cipher selection of strong includes some notably weak ciphers.
    遗憾的是,在V7之前,默认的SSL强密码选择包含一些明显非常弱的密码。
  2. The default settings are to allow all V2 and V3 ciphers.
    默认设置是允许所有V2和V3加密程序。
  3. For this traffic to be best protected, strong cryptographic ciphers should be used.
    为了更好地保护通信流,应该使用强密码。
  4. Ssh and its variants provide stronger authentication mechanisms and encrypt all traffic using your choice of several ciphers.
    ssh及其变种提供了更强的身份验证机制,并使用您所选择的几个密码对所有的通信内容进行加密。
  5. Note that not all of the digest and ciphers here are supported, but your OpenSSL must support the cipher and digest that you want to use.
    注意,并非这里的所有摘要和密码都受到支持,但您的OpenSSL必须支持您想要使用的密码和摘要。
  6. You learned how to create encrypted files and directories and how to change ciphers and inheritance through commands.
    您了解了如何创建加密的文件和目录,以及如何通过各种命令来更改密码和继承。
  7. You should set this to HIGH ( this is the default) to limit the acceptable ciphers unless you have a good reason not to.
    您应该将其设置为HIGH(这是缺省值)以限制可接受的密码,除非您有很好的理由不这么做。
  8. You should remove those ciphers or a client might select one of them.
    应该删除这些密码,否则客户机可能会选用它们。
  9. So stream ciphers is the hot subject in the world.
    因此,流密码一直是各国争相研究的热门课题。
  10. A device for deciphering codes and ciphers.
    用来解释密码或代码的装置。
  11. I guess this must be a book of ciphers.
    其实我猜它就是个密码本。
  12. Research on Error-Correcting Codes and Sequence Ciphers Over Finite Rings in Information Safety
    信息安全中有限环上的纠错码和序列密码研究
  13. So many ciphers today we could crack-we know how to crack them.
    现在有这么许多的密码我们都可以破译,我们知道怎么破译。
  14. As you can see, working with JDK Ciphers is quite a cumbersome task.
    如你所见,使用JDKCipher是一项相当繁重的任务。
  15. In the design and the analysis of block ciphers, multi-output functions play an important role.
    在分组密码的实际设计中,多输出布尔函数常常扮演重要角色。
  16. In data security, the science and study of methods of breaking ciphers.
    在数据安全领域中,对破译密码的方法进行研究的一门学科。
  17. This dissertation mainly focuses on the investigation of deterministic randomness theory and its application to chaotic ciphers.
    本文主要研究确定性随机理论及在混沌密码学中的应用可行性。
  18. The Guvners think she created Sigil, while the Ciphers wonder if it's all her dream.
    管理者认为是痛苦女士创建了印记城,而密韵者则怀疑这一切都只是痛苦女士的梦境。
  19. Study on Resynchronization of Stream Ciphers in Noisy Channel
    有噪信道中的流密码重同步方法研究
  20. Teachers complained that the new regulations turned them into ciphers.
    教师们抱怨新的规章制度把他们变成了极不重要的人。
  21. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should have optimum algebraic immunity.
    为了有效地抵抗代数攻击,密码系统中使用的布尔函数必须具有最佳的代数免疫。
  22. As a former intelligence expert he had information about enemy ciphers.
    他以前做过谍报专家,知道关于敌方密码的信息。
  23. In this paper, the basic contents of the algebraic attacks on stream ciphers with linear feedback are introduced.
    概述了流密码代数攻击的提出和发展,介绍了它的基本思想。
  24. Shiro tries to simplify the entire concept of cryptographic ciphers by introducing its CipherService API.
    Shiro通过引入它的CipherServiceAPI试图简化加密密码的整个概念。
  25. Block ciphers'security mostly depends on S box that is the only non-linear structure in most block ciphers.
    分组密码的安全性很大程度上取决于分组密码中唯一的非线性结构S盒。
  26. Ciphers are cryptographic algorithms that can reversibly transform data using a key.
    加密是使用密钥对数据进行可逆转换的加密算法。
  27. By comparison with Data Encryption Standard ( DES), the concept to design new key generation algorithm of block ciphers was analyzed.
    通过与DES比较,分析了新一代分组密码的密钥生成算法的设计思路。
  28. Block ciphers can be used in many cryptographic primitives, such as encryption and message authentication code ( MAC).
    分组密码广泛应用于各类密码算法,如加密算法和消息认证码(MAC)。
  29. One of the consequences of network economics, as facilitated by ciphers and digital technology, is the transformation of what we mean by pretty good privacy.
    由密码和数字技术推动,网络经济学改变了我们所谓的“不错的隐私”。
  30. In popular symmetric ciphers, the S-box substitution is the core operation that dominates the execution of cryptographic algorithms.
    S盒代换是大多数对称密码算法的核心操作,加快S盒代换是提高密码编码处理速度的关键。