加密演算法 meaning in English
encryption algorithm
Examples
- Both common forms of cryptographic algorithms
加密演算法的两种常见形式 - Try to use built - in primitives instead of building your own construction out of an encryption algorithm and a hash function
尝试使用内置原语而不是抛开加密演算法和杂凑函数去建构自己的构造。 - Developer can choose an encryption algorithm and customize encryption algorithm factor 256 kinds algorithms , 24 bits algorithm factor , which can have 16000000 kinds variety .
开发商可以自选加密演算法,并可以自定义加密演算法因数256种演算法, 24位元演算法因数,共有1600万种因数变化可供选择。 - Shell tool can be used for protection of executable files and data by developers , in addition , high intensity encryption algorithm is also used in the shell tool , and it is therefore highly secure
外壳工具可以供开发商直接对可执行档和资料进行保护,同时外壳工具采用了高强度加密演算法,具有极高的安全性。 - Second - generation encryption engine and a large number of advanced encryption algorithm are used in the encryption module of granddog , it is therefore capable of effectively preventing from the static analysis and dynamic tracing of hackers
宏狗的加密模组使用了第二代安全加密引擎,采用了大量先进的加密演算法,可以有效防止骇客进行静态分析和动态跟踪。