• 数字签署大型文件首先使用这些算法一种安全的方式压缩(计算固定长度的哈希码)文件,然后签署

    For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.

    youdao

  • 类型属性指出hash算法例如消息摘要算法5 (MD5)安全哈希算法(SHA - 1)。

    The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).

    youdao

  • 用于检索安全哈希算法修订版掩码修订版更正了SHA中的一个发布的错误

    A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.

    youdao

  • 不幸的是,这个哈希函数不是非常安全可以通过字典攻击算法被破解类似命令行应用程序

    Unfortunately, this is not a very secure hash function, it can be a dictionary attack to break algorithm similar to the command-line application!

    youdao

  • 算法信息安全领域主要应用验证数据完整性签名认证

    In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.

    youdao

  • 介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全没有损失,但是速度得到了提高。

    In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.

    youdao

  • 介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全没有损失,但是速度得到了提高。

    In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定