其他特性还包括加密散列函数,加密转换库和加密硬件支持。
Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.
SSL客户机开始对话并发送诸如ssl版本之类的信息,同时还发送加密算法以及它所支持的散列函数。
The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.
SSL服务器用加密算法以及要使用的散列函数来表示响应。
The SSL Server responds with the encryption algorithm and hash function to be used.
加密算法和散列函数被进一步分组到密码规范中。
The encryption algorithm and the hash function are further grouped into CipherSpecs.
为了使SSL会话中所使用的加密算法和散列函数的规范更容易,这些算法被分组到各个密码套件(CipherSuite)中。
To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.
为了防止人们在该文件写入内容,苹果用校验和散列(checksum hash)函数对其进了加密。
To prevent people from writing to this file, Apple protects it with a checksum hash which has to be reverse-engineered.
提出了一种利用加密算法并结合散列函数选择文本中嵌入水印的汉字序列的算法。
A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking.
这次竞赛的目的是为了寻找一个强大的替代品,来取代现有的散列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要差的加密性。
The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.
MD 5是一个“加密”散列函数,因为生成一个具有特定给定散列值的信息块非常困难。
MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐