As you saw in Part 1, this public key would be based on the RSA algorithm.
您从第1部分中可以看到,这个公钥是基于rsa算法生成的。
Once the input vectors have passed the "equal size" and "size greater than 1" tests, the heart of the algorithm is executed.
一旦输入向量通过了“大小相等”和“值大于1”测试,就执行算法的核心部分。
I just want to support one encryption algorithm (DES in CBC mode) whose INTEGER identifier is 1, 2, or 3, depending upon the message digest algorithm of the client's choice.
我只希望支持一种加密算法(CBC模式下的DES),根据客户机所选择的消息摘要算法,它的INTEGER标识号是1、2或者3。
A flow chart representing the algorithm for getting the information from the STAB format follows in Figures 1 and 2.
图1和图2中的流程图显示了从stab格式收集信息的算法。
Table 1 lists the sample content of BUSINESS.SF files in your feature and plug-in JAR files. The version, signature algorithm, JVM, and digest information are provided there.
表1列出了特性JAR文件和插件JAR文件中的BUSINESS.SF文件的示例内容,包括版本、签名算法、J VM和摘要信息。
The final step needed to complete Step 1 of the planned algorithm is to perform the actual filtering.
在这一算法中完成步骤一所需要的最后一步操作,就是执行实际的筛选。
On receiving a reply from the server, the algorithm in Listing 1 is followed.
收到服务器的回复之后,将执行清单1中的算法。
A typical parallel divide-and-conquer algorithm takes the form shown in Listing 1.
典型的并行divide - and - conquer算法的形式如清单1所示。
At a chunkSize of 1, this will create a per-pixel correct rendering of the distortion algorithm, while each increase in chunkSize will drastically reduce the number of SDL_BlitSurface calls required.
chunksize取1将得到失真算法的逐像素矫正呈现。增大chunkSize将大大减少SDL_BlitSurface的调用次数。
The pipelined implementation shows that the new algorithm occupies about 1/16 of the old one.
采用流水线结构的硬件实现表明,新算法占用的资源大约为原来的1/16。
The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。
The padding is terminated by a "00" byte. It's followed by "30 21 30 09 06 05 2B 0E 03 02 1A 05 00 04 14" which is the PKCS #1 v2.1 way of specifying the SHA-1 hash algorithm.
填充字节以“00”结束,后面跟的是"3021 300906052B0E03021A 05 000414",PKCS #1v2.就是这样来指定SHA-1哈希算法。
The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.
hashcash提出质询的方式是,当通过安全散列算法(SecureHash Algorithm)进行散列时,要求“minters”生成 一个字符串(戳记,stamps),在它们的散列中有很多前导零。
What is important is that the algorithm guarantees that after a sequence of operations the expensive operations will be amortised and thereby rendering the entire operation O(1).
重要的是,算法保证在一系列的操作之后,耗时昂贵的操作时间被分摊,从而使整改操作的时间复杂度为O(1)。
Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.
今天谷歌破解了一种名为SHA-1的老式加密算法,尽管此事听起来不像是网络安全界最重大的里程碑。
Therefore, the hybrid intelligence algorithm is effective to solve 0-1 knapsack problems.
因此,应用该混合智能算法求解0 - 1背包问题是比较有效的。
The mathematical model of discrete optimal design of structures of RCCP is established, and introduced a binary algorithm on the (0, 1) program.
建立了适合钢筋混凝土地下埋管的离散变量模型,并给出了计算该(0,1)规划的一种二进制算法。
What's the algorithm for 2:1 balancing a linear octree?
什么是2:1平衡线性八叉树的算法吗?
Google still believes that its research should encourage all companies that are still using this algorithm to stay away from SHA-1, which has long been considered to be very secure.
谷歌仍然认为其研究应该会促使仍在使用这种算法的所有公司远离长期以来被认为安全性很差的SHA - 1。
An improved LR (1) parsing table and its construction algorithm are proposed.
改进了传统的LR(1)分析表,提出了新的构造算法。
Adaptive Kalman filter algorithm study (1) Based on the study of the passive target tracking in modified polar coordinates, the nonlinear dynamic model is devised.
自适应滤波算法(1)研究了极坐标系下的水下目标被动跟踪问题,建立了被动跟踪的动力学模型。
However, in the case of the use of SHA-1, such as the existence of certain defects in the hash algorithm, with abundant resources of the attacker is able to achieve this kind of collision results.
然而,在使用SHA - 1等存在一定缺陷的散列算法的情况下,拥有充裕资源的攻击者确实能够实现这种碰撞结果。
Compared with 2.4 version kernel, 2.6 has been improved in real-time performance by adopting some new technologies, such as preemptible kernel, new o (1) schedule algorithm etc.
相比2.4内核,2.6采用了一些新技术使得实时性有了很大提高,如可抢占式内核、新的O(1)调度算法等。
And third, we give an algorithm transforming LL (1) analytic table into state table.
第三部分介绍了LL(1)分析表改成状态表的算法。
The main novel contributions of this paper are as follow: 1. Difference merged image algorithm based on CNN is presented.
本文的主要研究贡献有:1。提出基于CNN差分图象合并的视频分割算法。
The equal error rate(EER) of the algorithm is 1.
得到算法的等错误率(EER)为1。
This paper presents a hierarchical scheduling algorithm based on NUMA topology after analyzing the O(1) scheduling algorithm's support for NUMA.
该文在深入分析O(1)调度算法对NUMA支持的基础上,提出一种基于NUMA拓扑结构的分级调度算法。
This paper presents a hierarchical scheduling algorithm based on NUMA topology after analyzing the O(1) scheduling algorithm's support for NUMA.
该文在深入分析O(1)调度算法对NUMA支持的基础上,提出一种基于NUMA拓扑结构的分级调度算法。
应用推荐