• 本文利用来自不同运算构造一种能证明其安全性杂凑算法应用已证明的结果构造安全的消息认证

    The construction of a provable hash algorithm is developed based on the operations from various groups, also, a safety message authentication code is presented by the result.

    youdao

  • 任何好的密码杂凑算法应该是这样的,即使给定已知讯息和与关联的讯息杂凑,也很难找到替代明码的迭代杂凑

    Any good cryptographic hashing algorithm should make finding a duplicate hash for an alternative plaintext difficult, even given a known message and its associated message hash.

    youdao

  • 这个属性有金杂凑算法之金钥。

    This property is the key for the keyed hash algorithm.

    youdao

  • 为了验证认证,会使用MD 5演算法杂凑使用者密码储存做比较。

    To validate credentials, the user password is hashed using the MD5 algorithm and compared to the stored value.

    youdao

  • 为了验证认证,会使用SHA1算法杂凑使用者密码储存比较

    To validate credentials, the user password is hashed using the SHA1 algorithm and compared to the stored value.

    youdao

  • 衍生类别覆写时,做为杂凑算法资料结构之指定物件的杂凑式,例如杂凑

    When overridden in a derived class, serves as a hash function for hashing algorithms and data structures, such as a hash table.

    youdao

  • 衍生类别覆写时,做为杂凑算法资料结构之指定物件的杂凑式,例如杂凑

    When overridden in a derived class, serves as a hash function for hashing algorithms and data structures, such as a hash table.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定