• 其他特性还包括加密散列函数加密转换加密硬件支持

    Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.

    youdao

  • SSL客户机开始对话发送诸如ssl版本之类信息同时还发送加密算法以及所支持散列函数

    The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.

    youdao

  • SSL服务器用加密算法以及使用散列函数表示响应。

    The SSL Server responds with the encryption algorithm and hash function to be used.

    youdao

  • 加密算法函数进一步分组密码规范中

    The encryption algorithm and the hash function are further grouped into CipherSpecs.

    youdao

  • 为了使SSL会话使用加密算法散列函数规范更容易,这些算法分组各个密码套件(CipherSuite)中。

    To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.

    youdao

  • 为了防止人们文件写入内容,苹果校验(checksum hash)函数加密

    To prevent people from writing to this file, Apple protects it with a checksum hash which has to be reverse-engineered.

    youdao

  • 提出一种利用加密算法结合散列函数选择文本嵌入水印汉字的算法。

    A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking.

    youdao

  • 这次竞赛目的是为了寻找一个强大的替代品,来取代现有列函数集。因为现有的散列函数集中有些已经显现出当初设想的要加密性。

    The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.

    youdao

  • MD 5个“加密函数因为生成一个具有特定给定散列信息非常困难

    MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定