1. Firstly, what are crypto-currencies?
首先,什么是加密货币?

来自互联网

2. It does not use any keystrokes and has near-crypto-key strength.
它不使用任何按键,并已接近加密的关键力量。

来自互联网

3. Given this, we shall likely not know for a prolonged period of time how successful the crypto-currency experiment will be.
鉴于此,我们有可能在很长一段时间内无法了解加密货币是否会成功。

来自互联网

4. To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.
为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。

来自互联网

5. These MIDS-LVT terminals provide real-time data communications, situational awareness, navigation and digital voice capability, all in a jam-resistant, crypto-secured package.
MIDS - LVT终端提供了实时数据通信、动态感知、导航和数字语音功能,所有这些都在一个抗拥塞、加密保护的程序包中完成。

来自互联网

6. It's even more common to find crucial flaws in crypto-graphic algorithm implementations, which can turn strong encryption into weak encryption (or sometimes no encryption at all).
而更为普遍的情况是,加密算法实现被发现具有关键的缺陷,可以让原本的强加密退化成弱加密(有时甚至相当于完全不加密)。

来自互联网

7. This prevents the crypto material from having to be stored on the appliance's file system, as the material will be cached in memory upon retrieval.
这阻止必须将加密材料储存在设备的文件系统中,因为加密材料可以在获取时缓存在内存中。

来自互联网

8. Each message is transported in its own crypto envelope, which includes both the payload and the identity of the sender.
每条消息都在自己的加密信封中传输,加密信封包含发送者的负载和身份。

来自互联网

9. The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。

来自互联网

10. You could use the same approach to help solve Crypto problems.
您可以使用同一种方法来帮助解决密码问题。

来自互联网

11. They're not hard to use but getting crypto right (meaning without huge flaws) is something that takes years and a lot of peer reviews from other crypto experts.
它们不难使用,但要获取加密权限(意味着没有大的缺陷)需要花费几年的时间,有大量来自其他加密专家的相关评论。

来自互联网

12. The ordered crypto products will be delivered by summer 2010.
这份加密产品定单将在2010年夏天交付。

来自互联网

13. There is no cure for crypto, but antiretroviral therapy to restore immunity can effectively clear up the infection.
没有治疗隐孢子虫病的方法,但抗逆转录病毒疗法可以恢复免疫功能从而有效地清除感染。

来自互联网

14. Using the best available crypto on the weakest platform on the planet won't buy you much security!
在世界上最脆弱的平台上使用最好的加密也不会给您带来多少安全性。

来自互联网

15. What should alarm you is that crypto still isn't there - in the millions of medical records, credit-card databases.
但是必须警告你在成百上千万的病历卡、信用卡数据库中还没有设置密码。

来自互联网

16. As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.
按照惯例,当出现加密的时候,理解整个系统的出发点就是思考跟密钥有关的问题:有多少密钥,谁持有,如何使用。

来自互联网

17. The TETRA crypto provides users with the freedom to choose a terminal based on their own specific needs while safeguarding the ability to communicate securely with all other users.
TETRA的加密功能为用户提供自由选择具体需要的终端,同时保障与所有其他用户的安全通信能力。

来自互联网

18. So in general, both of these are examples of what we call secret key crypto.
所以通常,这两个都是,加密技术的例子。

来自互联网

19. Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。

来自互联网

20. There really are no more details on what procedures Dropbox has in place or how they implement the crypto to prevent unauthorized access to your files.
关于Dropbox业已到位的安全程序或者他们如何实施加密以阻止对你的文件的未授权访问,根本没有更多的细节。

来自互联网

21. DRBD USES the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used.
DRBD使用Linux加密应用程序编程接口,因此在完整性算法使用方面是比较灵活的。

来自互联网

22. Replacing all the closed code with open source one: libc_i18n, NFS lock manager, portions of crypto framework, many critical drivers.
使用开源代码替换所有非开源代码包括libc _ i18n、NFS锁管理器、加密框架部分以及大量关键的驱动程序。

来自互联网

23. Wiggs suggests keeping crypto keys or other sensitive data in byte arrays which should be overwritten with zero as soon as they are no longer used.
Wiggs建议把加密密钥或其他敏感数据保存在字节数组中,那样能够在不需要的时候就会被重写为零。

来自互联网

24. The WebSphere DataPower SOA Appliance allows the crypto objects to be created individually and then selected in the configuration needed.
WebSphereDataPowerSOAAppliance允许逐个创建crypto对象,然后在所需的配置中进行选择。

来自互联网

25. Enter name for private crypto key to be used for signing, ws-dsig-receiver-private.
输入用于进行签名的私有加密密钥的名称WS - dsig - receiver - private。

来自互联网

26. Enter name for public crypto certificate, ws-dsig-receiver-public.
输入公共加密证书的名称WS - dsig - receiver - public。

来自互联网

27. Cryptosporidiosis (crypto) and isosporiasis are both caused by protozoan parasites.
隐孢子虫病(crypto)和等孢球虫病都是由原生动物寄生虫引起的。

来自互联网

28. Crypto objects are created and configured into the processing rules.
将创建Crypto对象并将其配置到处理规则中。

来自互联网

29. Enter name for Document Crypto map, ws-encrypt-map.
输入DocumentCryptomap的名称WS -encrypt - map。

来自互联网

30. Enter name for Document Crypto map, ws-encrypt-map.
输入DocumentCryptomap的名称WS -encrypt - map。

来自互联网