• In this way, a node computes a hash of a block; transfers the much smaller signature to the peer node, which also calculates the hash; and then compares them.

    这样一来节点可以计算一个列值;将较小签名转移对等节点,节点可以计算散列值,然后对两者进行比较。

    youdao

  • ZFS solves this issue by generating a 32-bit checksum (or 256-bit hash) for metadata for each block written.

    ZFS通过写入的每个元数据生成32位校验和(256散列)解决了问题

    youdao

  • The second block of code creates a hash map and populates it with name-value pairs that provide the information required to make a blog post.

    第二代码创建一个hash映射使用名称-值对填充,这些名称-值对提供创作博客文章所需信息

    youdao

  • MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.

    MD 5个“加密函数因为生成一个具有特定给定散列信息非常困难

    youdao

  • Part 2 (chapters 4-7) introduces the basic techniques of modern cryptography, including symmetric cryptography (block ciphers, stream ciphers), Hash functions, public-key cryptography technology.

    第2部分(第4 ~ 7章)主要介绍现代密码学基本技术包括对称密码技术(分组密码、序列密码)、Hash函数公钥密码技术等。

    youdao

  • Part 2 (chapters 4-7) introduces the basic techniques of modern cryptography, including symmetric cryptography (block ciphers, stream ciphers), Hash functions, public-key cryptography technology.

    第2部分(第4 ~ 7章)主要介绍现代密码学基本技术包括对称密码技术(分组密码、序列密码)、Hash函数公钥密码技术等。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定