Does character encoding affect hash algorithms like MD5?
就像MD 5哈希算法的字符编码的影响?
Hash algorithms are very important functions in computer security.
散列算法对计算机安全起着举足轻重的作用。
Digital signatures and hash algorithms are mechanisms used to provide data integrity.
数据签名和哈希算法是用于提供数据完整性的机制。
Some vendors combine hash algorithms to reduce the possibility of a hash collision.
一些厂商结合散列算法,以减少哈希碰撞的可能性。
Specifies all the hash algorithms used for hashing files and for generating the strong name.
指定用于哈希文件和用于生成强名称的所有哈希算法。
In the later versions some key generation algorithms, which use hash algorithms, have been added.
在后来的版本中一些关键的生成算法,它使用哈希算法,已被添加。
Secure hash algorithms are important tools for cryptographic applications such as digital signatures.
安全散列算法是数字签名等密码学应用中重要的工具。
Mhash is a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms.
Mhash是一个免费的(在GNU LGPL授权)库,它提供了一个统一的接口了大量的哈希算法。
Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes.
并且这些体系所使用散列算法在实质上都是串行的,因而待加密数据越长,加密运算时光越长。
The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.
性能测试的结果表明密码算法和单向散列算法在SDTA结构上获得了较好的性能。
In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.
SSL客户机开始对话并发送诸如ssl版本之类的信息,同时还发送加密算法以及它所支持的散列函数。
The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.
签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。
To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.
为了使SSL会话中所使用的加密算法和散列函数的规范更容易,这些算法被分组到各个密码套件(CipherSuite)中。
The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.
要数字签署大型文件,首先使用这些算法用一种安全的方式压缩(计算固定长度的哈希码)文件,然后再用私钥签署。
The algorithms are designed so that the probability of two different sets of data computing the same hash value — a collision — is extremely small.
而所用密码算法在设计上要使从两组不同数据得到同一个散列值——即“碰撞”——的概率极其小。
While loading, it is possible to reorganize the data to better suit the algorithms -- for example, loading into a hash table or a database may help in working with a large data set.
加载的时候,可以重新组织数据,以便更好地适应算法。比如,加载到散列表或者数据库中可以帮助处理大型数据集。
Hash function plays an important role in the query algorithm, and the query algorithms based on it achieves a constant time complexity in theory.
散列函数在查询算法中起着重要作用,基于此的查询算法在理论上可达到常数级时间复杂度。
The existing one-way hash functions without trapdoor are all iterative algorithms, for instance, MD and SHA family, etc.
现有的无陷门单向散列函数都是迭代算法,例如SHA和MD系列算法等。
It compares these algorithms through experimentations. The results shows that the time efficiency of the algorithm based on 2 hash tables is higher than those obtained based on 3 hash tables.
通过实验对这几种算法进行了比较,结果表明基于2个哈希表分类的算法的时间效率要高于基于3个哈希表分类的算法。
When overridden in a derived class, serves as a hash function for the specified object for hashing algorithms and data structures, such as a hash table.
当在派生类中被重写时,用作指定对象的哈希算法和数据结构(如哈希表)的哈希函数。
Serves as a hash function for a particular type, suitable for use in hashing algorithms and data structures such as a hash table.
用作特定类型的哈希函数,适合在哈希算法和数据结构(如哈希表)中使用。
Then we bring forward the stack-hash model of label management, and submit data structures and implement algorithms corresponding to this model.
然后提出栈-散列表符号管理模型,并给出相应的数据结构和实现算法;
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
When overridden in a derived class, serves as a hash function for hashing algorithms and data structures, such as a hash table.
在衍生类别中覆写时,做为杂凑演算法和资料结构之指定物件的杂凑函式,例如杂凑表。
DHT (Distributed Hash Table) search algorithms is mainly adopted in the structured P2P network, it works fast and efficiently, but it is also limited by the network topology structure;
结构化P2P网络中主要采用分布式哈希(DHT)搜索算法,它查找速度快、效率高,但受网络拓扑结构的限制其应用有限;
This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.
该方案主要以目前比较成熟的公钥密钥学理论为基础,用到了RSA加解密、摘要、数字信封等算法。
This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.
该方案主要以目前比较成熟的公钥密钥学理论为基础,用到了RSA加解密、摘要、数字信封等算法。
应用推荐