• This process also USES hash functions.

    过程使用哈希函数

    youdao

  • Hash functions are fundamental to modern cryptography.

    哈希函数现代密码系统基础

    youdao

  • We'll have more to say about this when we discuss hash functions.

    讨论哈希函数时候会谈这个问题。

    youdao

  • This paper presents a curve-fitting method to construct Hash functions.

    本文给出一种构造哈希函数的曲线拟合法。

    youdao

  • Cryptographic hash functions play a fundamental role in modern cryptography.

    现代密码学中,杂凑函数占据基础而又重要的地位

    youdao

  • Hash functions are commonly used with digital signatures and for data integrity.

    哈希函数通常用于数字签名保持数据完整性。

    youdao

  • Hash functions can be complex and sophisticated, but modern libraries have good defaults.

    哈希函数可以非常复杂现在已经类库提供很好的缺省支持

    youdao

  • Perfect hash functions are time- and space-efficient implementations of static search sets.

    完美散列函数种在时间空间方面都十分高效静态搜索实现

    youdao

  • There is more information on hash functions and equality predicates in the next section .

    在下一节中,更多关于散列函数同性谓词的信息

    youdao

  • Are standard hash functions like MD5 or SHA1 quaranteed to be unique for small input (4 bytes)?

    标准散列函数MD5SHA1保障输入唯一的(4字节)?

    youdao

  • Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.

    其他特性还包括加密散列函数,加密转换加密硬件支持

    youdao

  • Message digests are secure one-way hash functions that take arbitrary-sized data and output a fixed-length binary hash value.

    消息摘要安全单向哈函数,它可以接受任意大小的输入数据输出固定长度的二进制哈希值。

    youdao

  • The existing one-way hash functions without trapdoor are all iterative algorithms, for instance, MD and SHA family, etc.

    现有陷门单向散列函数迭代算法例如SHAMD系列算法

    youdao

  • Message Digests are secure, one-way hash functions that convert arbitrary length data into fixed-length check sum / hash code.

    消息摘要是一个安全的单向的哈函数任意长度数据转化成固定长度校验和/哈希码。

    youdao

  • The existing solutions use hash-based flow sampling algorithm, which assumes that the uniform random hash functions are available.

    现有解决方案使用基于哈抽样算法基本假设存在均匀随机函数

    youdao

  • The most important generic attack on the collision resistant is the birthday attack, it is used to attack all kinds of hash functions.

    生日攻击通用碰撞攻击方法,用于攻击任何类型散列函数。

    youdao

  • The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.

    SSL客户机开始对话发送诸如ssl版本之类信息同时还发送加密算法以及所支持散列函数

    youdao

  • Test results showed that the speed of HTBC algorithm is slightly faster (about 5%) than that of hash functions in common use (for instance, SHA1 algorithm).

    测试表明HTBC算法速度常用单向散列函数(例如SHA1算法)(5%左右)。

    youdao

  • Making use of the good properties of cryptography Hash functions and the difficulties of DLP, a verifiable and linkable ring signature scheme is constructed.

    利用密码哈希函数良好性质DLP的困难性问题构造了一个验证可关联的签名方案

    youdao

  • The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.

    这次竞赛目的是为了寻找一个强大的替代品,来取代现有列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要加密性。

    youdao

  • To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.

    为了使SSL会话使用加密算法散列函数规范更容易,这些算法分组各个密码套件(CipherSuite)中。

    youdao

  • Hash functions can be complex and sophisticated, but modern libraries have good defaults. The important thing is how hashes work and how to tune them for maximum performance benefit.

    函数非常复杂现代中都现成的类,重要如何列法进行细获得最好性能

    youdao

  • Part 2 (chapters 4-7) introduces the basic techniques of modern cryptography, including symmetric cryptography (block ciphers, stream ciphers), Hash functions, public-key cryptography technology.

    第2部分(第4 ~ 7章)主要介绍现代密码学基本技术包括对称密码技术(分组密码、序列密码)、Hash函数公钥密码技术等。

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • A hash defining all the attributes and functions.

    定义所有属性函数hash

    youdao

  • Hash algorithms are very important functions in computer security.

    散列算法计算机安全起着举足轻重作用

    youdao

  • Hash algorithms are very important functions in computer security.

    散列算法计算机安全起着举足轻重作用

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定