Further, no one-way hash should be a reversible function.
进一步,没有单向散列应该是一个可逆的功能。
MD5 is not a reversible function. Further, no one-way hash should be a reversible function.
MD 5不是可逆的功能。进一步,没有单向散列应该是一个可逆的功能。
The method is called DigestSearch because it USES the unique digest (one-way hash) value to represent a search word.
该方法称作DigestSearch是因为它使用惟一摘要(单向散列)值来表示一个搜索字。
The existing one-way hash functions without trapdoor are all iterative algorithms, for instance, MD and SHA family, etc.
现有的无陷门单向散列函数都是迭代算法,例如SHA和MD系列算法等。
Message digests are secure one-way hash functions that take arbitrary-sized data and output a fixed-length binary hash value.
消息摘要是安全的单向哈希函数,它可以接受任意大小的输入数据,并输出固定长度的二进制哈希值。
Message Digests are secure, one-way hash functions that convert arbitrary length data into fixed-length check sum / hash code.
消息摘要是一个安全的、单向的哈希函数,把任意长度的数据转化成固定长度的校验和/哈希码。
The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.
性能测试的结果表明密码算法和单向散列算法在SDTA结构上获得了较好的性能。
To overcome the weakness of too many keys, we present an improvement of their signature scheme by getting rid of the one-way Hash function.
为了克服其方案密钥量大的缺陷,通过去掉单向哈希函数,给出1个改进方案。
Combining the advantages of chaotic coupled system and conventional one-way hash algorithm, a new keyed one-way hash function was presented.
结合双混沌系统以及传统散列函数的优点,提出一种新的带密钥单向散列函数的构造方法。
In the research of simplifying PKI system, this paper proposes an improved PKI system based on the combine of the IBE and the one-way hash chain.
在简化pki系统的研究中,本文首先介绍基于身份的加密算法,然后结合单向哈希链,提出一种基于IBE的改进PKI系统。
If the sensitive information needs only to be verified and not decrypted to a human-readable format, encrypt the sensitive information using a one-way hash.
如果只需要验证敏感资讯,而不将它解码为人们可读取的格式,则使用单向杂凑加密敏感资讯。
Sensitivity of data cached: if it is a password, you might be able to use a one-way hash to store the password securely while gaining accelerated performance.
所高速缓存的数据的灵敏度:如果数据是个密码,您可能可以在获得已加速的性能的同时使用单向散列来安全地存储密码。
The client terminates the handshake by sending a message to the server that it has finished, an encrypted set of one-way hash values to be verified by the server.
客户机通过向服务器发送一个表明自己已经完成握手的消息,以及一组加密的单向hash值让服务器进行验证,从而结束握手的过程。
The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.
hashcash提出质询的方式是,当通过安全散列算法(SecureHash Algorithm)进行散列时,要求“minters”生成 一个字符串(戳记,stamps),在它们的散列中有很多前导零。
So to construct a nonblocking linked list, tree, or hash table, we need to find a way to update multiple Pointers with CAS without leaving the data structure in an inconsistent state.
所以,要构建一个非阻塞的链表、树或哈希表,需要找到一种方式,可以用CAS更新多个指针,同时不会让数据结构处于不一致的状态。
In hindsight, I realize that the best way to obfuscate this link would be to use an MD5-generated hash value, effectively hiding all voter information.
然后,我又意识到能使这个链接更具迷惑性的方法是使用一个MD 5生成的哈希值,从而有效地隐藏所有投票者的信息。
In this way, a node computes a hash of a block; transfers the much smaller signature to the peer node, which also calculates the hash; and then compares them.
这样一来,一个节点可以计算一个块的散列值;将较小的签名转移到对等节点,该节点也可以计算散列值,然后对两者进行比较。
Well the idea of a hash, in fact, what's called a hash function is to have some way of mapping any kind of data into integers.
我要怎么做?实际上想法还是哈希,通过一个哈希函数,把任何种类的数据都映射成整数。
So let's look at the second example, all right, I keep doing that — this piece of code from here to here gives me a way of now creating a hash table of size 256.
所以让我们来看一下第二个例子,好的,我继续做那件事,这段代码中从这里到这里,是创建一个大小为256的哈希表。
Mediation is great way to hash out a dispute without the court system.
采用仲裁是免上法庭而能解决争端的好方法。
The way partitions really work is that a hash code is calculated on the key.
分区的工作方式是对键计算散列码。
Of course, if Obama really wants to make a hash of the world, I can think of no better way than to start launch airstrikes on Iran.
当然,如果奥巴马真的想给世界一点威慑,最好的办法就是对伊朗发动空袭。
The padding is terminated by a "00" byte. It's followed by "30 21 30 09 06 05 2B 0E 03 02 1A 05 00 04 14" which is the PKCS #1 v2.1 way of specifying the SHA-1 hash algorithm.
填充字节以“00”结束,后面跟的是"3021 300906052B0E03021A 05 000414",PKCS #1v2.就是这样来指定SHA-1哈希算法。
Since this command expects an array, the original hash is unwound into an array in such a way that the values follow their respective keys in the array.
由于这个命令需要以一个数组作为参数,所以将原来的哈希表拆解为一个数组,拆解的方式是,在数组中,每个值跟在它的键的后面。
When I found this way to use enumerations to access HASH strings I knew it was the right approach.
当我发现这种方式来使用枚举来访问我知道这是正确的做法哈希字符串。
Because Ruby does not require instance variable declaration, the simplest way to model instance variables is with a hash.
由于Ruby并不需要声明实例变量,因此建模实例变量最简单的方式就是使用散列。
This is, in fact, the gperf way of initializing the hash table that will store the command-line options and their associated attributes.
事实上,这就是gperf初始化散列表的方式,其中存储了命令行选项及其相关属性。
We don't use st to implement hash, so we have no way to provide this.
由于我们不用手动使用st来实现Hash,所以不需要暴露这个指针。
For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.
为了更多的利益,利用单向加密算法或散列,像MD 514或Blowfish,15将使密码的解密成为不可能。
If you have to work through a 10,000-item hash, there's no way of simplifying that process.
如果必须遍历一个10,000元素的hash表,那么就没有办法简化这个过程。
应用推荐