| 1. | Links data streams to cryptographic transformations 将数据流链接到加密转换。 |
| 2. | Hash algorithms are an example of cryptographic transformations 哈希算法是加密转换( |
| 3. | Defines the basic operations of cryptographic transformations 定义基本的加密转换运算。 |
| 4. | The stream on which to perform the cryptographic transformation 对其执行加密转换的流。 |
| 5. | Performs a cryptographic transformation of data 执行数据的加密转换。 |
| 6. | The cryptographic transformation that is to be performed on the stream 要对流执行的加密转换。 |
| 7. | Interface that defines the basic operations of cryptographic transformations 定义加密转换基本操作的接口。 |
| 8. | Defines a stream that links data streams to cryptographic transformations 定义将数据流链接到加密转换的流。 |
| 9. | Performs a cryptographic transformation of data using the rijndael algorithm 使用rijndael算法执行数据的加密转换。 |
| 10. | Cryptographic transformations that use asymmetric keys consume significant resources 使用非对称密钥进行的加密转换会消耗大量资源。 |