• 安全散列算法数字签名密码学应用中重要工具

    Secure hash algorithms are important tools for cryptographic applications such as digital signatures.

    youdao

  • 安全散列算法运算位数运算的轮数较多硬件实现耗费大量资源

    Duo to the many of the bits and times of the SHA, it need a lot of resources with hardware.

    youdao

  • hashcash提出质询的方式通过安全算法(SecureHash Algorithm)进行时,要求minters生成 一个字符串戳记,stamps),它们散列很多前导零。

    The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.

    youdao

  • hashcash提出质询的方式通过安全算法(SecureHash Algorithm)进行时,要求minters生成 一个字符串戳记,stamps),它们散列很多前导零。

    The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定