Results for encryption translation from Korean to Japanese

Korean

Translate

encryption

Translate

Japanese

Translate
Translate

Instantly translate texts, documents and voice with Lara

Translate now

Human contributions

From professional translators, enterprises, web pages and freely available translation repositories.

Add a translation

Korean

Japanese

Info

Korean

압축@ title collumn attachment encryption checkbox.

Japanese

圧縮

Last Update: 2011-10-23
Usage Frequency: 1
Quality:

Korean

제한 없음size of signing key / size of encryption key

Japanese

無期限size of signing key / size of encryption key

Last Update: 2011-10-23
Usage Frequency: 1
Quality:

Korean

this function returns the block size of the algorithm specified by the encryption descriptor td in bytes.

Japanese

この関数は、暗号化記述子 td で指定したアルゴリズムのブロック長を バイト単位で返します。

Last Update: 2011-10-24
Usage Frequency: 1
Quality:

Korean

키 관리자의 크기 항목에 마우스를 갖다 두면 서명 수를 볼 수 있습니다. 이를 사용하려면 키를 한 번 확장하여야 합니다. encryption algorithm

Japanese

鍵マネージャで鍵長のカラムの上にマウスを移動すると、署名の数がツールチップに表示されます。そのためには鍵を一度展開する必要があります。 encryption algorithm

Last Update: 2011-10-23
Usage Frequency: 1
Quality:

Korean

this function returns the maximum supported key size of the algorithm specified by the encryption descriptor td in bytes.

Japanese

この関数は、暗号化記述子 td で指定したアルゴリズムでサポートされ る最大キー長をバイト単位で返します。

Last Update: 2011-10-24
Usage Frequency: 1
Quality:

Korean

see also mcrypt_enc_get_supported_key_sizes() which is used on open encryption modules.

Japanese

see also mcrypt_enc_get_supported_key_sizes() which is used on open encryption modules.

Last Update: 2011-10-24
Usage Frequency: 1
Quality:

Korean

the example below implements a filter named rot13 on the foo-bar.txt stream which will perform rot-13 encryption on all letter characters written to/read from that stream.

Japanese

the example below implements a filter named rot13 on the foo-bar.txt stream which will perform rot-13 encryption on all letter characters written to/read from that stream.

Last Update: 2011-10-24
Usage Frequency: 1
Quality:

Korean

8) important: in this step, for the decoy system, you must select the same encryption algorithm and hash algorithm that you selected for the hidden system! otherwise, the hidden system will be inaccessible! in other words, the decoy system must be encrypted with the same encryption algorithm as the hidden system. note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).

Japanese

8) 重要:このステップで、囮システムに対して“隠しシステムとまったく同じ”暗号化アルゴリズムとハッシュアルゴリズムを選択してください! さもなければ隠しシステムにアクセスできなくなります! つまり囮システムは隠しシステムと同じ暗号化アルゴリズムで暗号化される必要があります。注:これは囮システムと隠しシステムは単一のブートローダーを共用しているからであり、このブートローダーはユーザーに指定された単一のアルゴリズムのみサポートしていることによります。

Last Update: 2009-12-09
Usage Frequency: 1
Quality:

Get a better translation with
8,798,966,582 human contributions

Users are now asking for help:



We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. Learn more. OK