It is called the function (cryptographic hash).
它被称为“加密哈希函数”(cryptographic hash function)。
Cryptographic hash functions play a fundamental role in modern cryptography.
在现代密码学中,杂凑函数占据基础而又重要的地位。
Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.
先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。
To do so, you would want to have a cryptographic hash or full-blown digital signature of the document.
为此,需要使用加密的散列值或者完善的文档数字签名。
Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.
其他特性还包括加密散列函数,加密转换库和加密硬件支持。
When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature.
当处于“record”模式时,这些停顿时间将被扩展为字符串并用于生成签名的密码散列。
The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm.
加密散列是使用SHA- 256算法来计算的,数字签名是使用rsa算法来生成的。
HMAC can be used with any iterative cryptographic hash function, such as MD5 or SHA-1, in combination with a secret Shared key.
HMAC可以与任何反复式的密码编译杂凑函式(例如MD 5或SHA - 1)一起使用,并与秘密共用金钥组合。
A cryptographic hash function has the property that it is computationally infeasible to find two distinct inputs that hash to the same value.
加密哈希函数有这样一个属性:在计算时不可能将两个不同的输入通过哈希算法取为相同的值。
Each check attribute constitutes an MD5 hash (a message digest algorithm commonly used in generating cryptographic hashes) of the following concatenated string.
每个check属性组成了以下连接字符串的MD 5散列(一种通常用于生成加密散列的消息摘要算法)。
Any good cryptographic hashing algorithm should make finding a duplicate hash for an alternative plaintext difficult, even given a known message and its associated message hash.
任何好的密码杂凑演算法应该是这样的,即使给定一个已知的讯息和与它关联的讯息杂凑,也很难找到替代明码的迭代杂凑。
This command will monitor the keystrokes of the currently in-focus X window and print out a cryptographic hash of the keystroke dwell times after 10 averages have been recorded across all Windows.
这条命令将监视持有焦点的x窗口的击键,并在所有窗口中记录了10个平均数后输出击键停顿时间的密码散列。
A hash is the result of a cryptographic function that takes an arbitrarily sized string of data, performs a mathematical encryption function on it, and returns a fixed-size string.
哈希是一种加密功能所获得的结果,这种加密需要获取任意大小的字符串数据,并用算法对其进行加密,然后返回一个固定大小的字符串。
To preserve bandwidth between the nodes (likely a constrained resource), DRBD doesn't move data between nodes to validate but instead moves cryptographic digests of the data (hash).
为了保护节点间的带宽(可能是一个受限资源),DRBD不需要在节点间移动数据进行验证,而是移动数据(hash)的加密摘要。
The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.
签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。
Secure hash algorithms are important tools for cryptographic applications such as digital signatures.
安全散列算法是数字签名等密码学应用中重要的工具。
Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.
要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。
MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.
MD 5是一个“加密”散列函数,因为生成一个具有特定给定散列值的信息块非常困难。
MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.
MD 5是一个“加密”散列函数,因为生成一个具有特定给定散列值的信息块非常困难。
应用推荐