substitution attack meaning in Chinese
替代攻击
Examples
- This whole - value substitution attack bypasses encryption altogether
这种整个值替换攻击可以完全绕过加密。 - Whole - value substitution attacks can be thwarted by adding contextual information to the plaintext before encrypting it
加密纯文本前在该文本中添加上下文信息,可避免上述整个值替换攻击。 - Their size parameters , the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed ; chapter three use sympletic geometry to construct authentication codes with arbitration , some parameters and the largest probability of successful attack are also computed ; chapter four is about lattices generated by transitive sets of subalgebras under finite chevalley groups
并计算了相关参数及成功伪造和成功替换的最大概率;第三章在辛几何的基础上构造了具有仲裁的认证码,亦计算了相关参数及各种攻击成功的最大概率;第四章讨论了有限域上chevalley群作用下的子代数轨道生成的格。