• SSL客户机开始对话发送诸如ssl版本之类信息同时还发送加密算法以及所支持散列函数

    The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.

    youdao

  • SSL服务器用加密算法以及使用散列函数表示响应。

    The SSL Server responds with the encryption algorithm and hash function to be used.

    youdao

  • 通过组合使用不同密钥长度散列算法IBMNAS提供1示的加密类型

    With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.

    youdao

  • 选择IPSec隧道中加密数据所用加密算法散列算法。

    Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.

    youdao

  • 为了更多利益利用单向加密算法散列MD 514Blowfish,15使密码解密成为不可能

    For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.

    youdao

  • 为了使SSL会话使用加密算法散列函数规范更容易,这些算法分组各个密码套件(CipherSuite)中。

    To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.

    youdao

  • 并且为了生成鼠标单击次数加密需要mkpasswd程序

    And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.

    youdao

  • PHP内置crypt功能可实现单向加密单向散列

    PHP's built-in crypt function implements one-way encryption or one-way hashing.

    youdao

  • 加密算法函数进一步分组密码规范中

    The encryption algorithm and the hash function are further grouped into CipherSpecs.

    youdao

  • 任何接收消息的人都可以消息使用相同散列算法然后使用公开密匙解密附带加密摘要比较两者的

    Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.

    youdao

  • 其他特性还包括加密散列函数加密转换加密硬件支持

    Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.

    youdao

  • 加密散列使用SHA- 256算法来计算的,数字签名是使用rsa算法来生成的。

    The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm.

    youdao

  • 为此需要使用加密散列或者完善文档数字签名

    To do so, you would want to have a cryptographic hash or full-blown digital signature of the document.

    youdao

  • 为了防止人们文件写入内容,苹果校验(checksum hash)函数加密

    To prevent people from writing to this file, Apple protects it with a checksum hash which has to be reverse-engineered.

    youdao

  • 加密散列碰撞什么

    What is encrypted hash collision?

    youdao

  • 每个check属性组成以下连接字符串MD 5(一种通常用于生成加密消息摘要算法)。

    Each check attribute constitutes an MD5 hash (a message digest algorithm commonly used in generating cryptographic hashes) of the following concatenated string.

    youdao

  • 本文讨论算法中一值的选取并分析比较加盐值所得到不同加密效果

    This paper discusses choosing a salt figure based on hashing algorithm, analyzes and compares the different encryption effects with salt figure or without salt figure.

    youdao

  • 生成一个新的公钥对吗?加密服务提供程序密钥长度散列算法设置都会保留

    Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.

    youdao

  • 这次竞赛目的是为了寻找一个强大的替代品,来取代现有函数集。因为现有的散列函数集中有些已经显现出当初设想的要加密性。

    The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.

    youdao

  • 提出一种利用加密算法结合散列函数选择文本嵌入水印汉字的算法。

    A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking.

    youdao

  • 并且这些体系所使用算法实质上都串行因而加密数据加密运算时光越长。

    Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes.

    youdao

  • MD 5个“加密函数因为生成一个具有特定给定散列信息非常困难

    MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.

    youdao

  • 本文讨论算法中一种盐值选取,并分析比较加与不加盐值所得到的不同的加密效果

    This article consists of five parts: search algorithm, flowchart, hash search function, heuristic search, and experimental results.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定