• Does character encoding affect hash algorithms like MD5?

    就像MD 5哈希算法字符编码影响

    youdao

  • Hash algorithms are very important functions in computer security.

    散列算法计算机安全起着举足轻重作用

    youdao

  • Digital signatures and hash algorithms are mechanisms used to provide data integrity.

    数据签名哈希算法用于提供数据完整性机制

    youdao

  • Some vendors combine hash algorithms to reduce the possibility of a hash collision.

    一些厂商结合算法减少碰撞可能性

    youdao

  • Specifies all the hash algorithms used for hashing files and for generating the strong name.

    指定用于文件用于生成名称所有算法

    youdao

  • In the later versions some key generation algorithms, which use hash algorithms, have been added.

    后来版本中一些关键生成算法使用哈希算法,添加

    youdao

  • Secure hash algorithms are important tools for cryptographic applications such as digital signatures.

    安全散列算法数字签名密码学应用中重要工具

    youdao

  • Mhash is a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms.

    Mhash免费(在GNU LGPL授权)提供了一个统一接口大量哈希算法。

    youdao

  • Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes.

    并且这些体系所使用算法实质上都串行因而加密数据,加密运算时光越长。

    youdao

  • The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.

    性能测试结果表明密码算法单向列算法SDTA结构上获得好的性能。

    youdao

  • In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.

    文章阐述数字签名技术原理并介绍了数字签名中的关键技术:公钥加密体制哈希算法

    youdao

  • The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.

    SSL客户机开始对话发送诸如ssl版本之类信息同时还发送加密算法以及所支持散列函数

    youdao

  • The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.

    签发机构证书“签名”,通过一种密码算法产生的散列值。

    youdao

  • To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.

    为了使SSL会话使用加密算法散列函数规范更容易,这些算法分组各个密码套件(CipherSuite)中。

    youdao

  • The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.

    使用加密算法的保密性这样一个事实保证,生成哈希匹配明文在计算上不可行的

    youdao

  • For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.

    数字签署大型文件首先使用这些算法一种安全的方式压缩(计算固定长度的哈希码)文件,然后私钥签署

    youdao

  • The algorithms are designed so that the probability of two different sets of data computing the same hash value — a collisionis extremely small.

    而所用密码算法设计上使不同数据得到同一个散列——即“碰撞”——概率极其小。

    youdao

  • While loading, it is possible to reorganize the data to better suit the algorithms -- for example, loading into a hash table or a database may help in working with a large data set.

    加载时候可以重新组织数据以便更好地适应算法比如,加载列表或者数据库中可以帮助处理大型数据集。

    youdao

  • Hash function plays an important role in the query algorithm, and the query algorithms based on it achieves a constant time complexity in theory.

    散列函数查询算法中起重要作用基于查询算法在理论上可达到常数级时间复杂度

    youdao

  • The existing one-way hash functions without trapdoor are all iterative algorithms, for instance, MD and SHA family, etc.

    现有陷门单向散列函数迭代算法例如SHAMD系列算法

    youdao

  • It compares these algorithms through experimentations. The results shows that the time efficiency of the algorithm based on 2 hash tables is higher than those obtained based on 3 hash tables.

    通过实验几种算法进行了比较,结果表明基于2个分类算法时间效率高于基于3个哈希表分类的算法。

    youdao

  • When overridden in a derived class, serves as a hash function for the specified object for hashing algorithms and data structures, such as a hash table.

    派生中被重写时用作指定对象算法数据结构(表)的哈希函数

    youdao

  • Serves as a hash function for a particular type, suitable for use in hashing algorithms and data structures such as a hash table.

    用作特定类型的哈函数适合算法数据结构(哈希表)中使用

    youdao

  • Then we bring forward the stack-hash model of label management, and submit data structures and implement algorithms corresponding to this model.

    然后提出栈-列表符号管理模型给出相应数据结构实现算法

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • When overridden in a derived class, serves as a hash function for hashing algorithms and data structures, such as a hash table.

    衍生类别覆写时,做为杂凑演算法资料结构之指定物件的杂凑式,例如杂凑

    youdao

  • DHT (Distributed Hash Table) search algorithms is mainly adopted in the structured P2P network, it works fast and efficiently, but it is also limited by the network topology structure;

    结构化P2P网络主要采用分布式哈希DHT搜索算法查找速度快效率高受网络拓扑结构的限制其应用有限;

    youdao

  • This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.

    方案主要以目前比较成熟公钥密钥学理论为基础到了RSA加解密、摘要、数字信封等算法。

    youdao

  • This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.

    方案主要以目前比较成熟公钥密钥学理论为基础到了RSA加解密、摘要、数字信封等算法。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定