• It is called the function (cryptographic hash).

    称为“加密哈函数”(cryptographic hash function)。

    youdao

  • Cryptographic hash functions play a fundamental role in modern cryptography.

    现代密码学中,杂凑函数占据基础而又重要的地位

    youdao

  • Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.

    先尝试普通使用场景下键入数千单词然后再输出密码散列

    youdao

  • To do so, you would want to have a cryptographic hash or full-blown digital signature of the document.

    为此需要使用加密散列值或者完善的文档数字签名

    youdao

  • Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.

    其他特性还包括加密散列函数,加密转换加密硬件支持

    youdao

  • When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature.

    处于record模式时,这些停顿时间将被扩展字符串用于生成签名密码散列

    youdao

  • The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm.

    加密散列使用SHA- 256算法来计算的,数字签名是使用rsa算法来生成的。

    youdao

  • HMAC can be used with any iterative cryptographic hash function, such as MD5 or SHA-1, in combination with a secret Shared key.

    HMAC可以任何反复式密码编译杂凑函式(例如MD 5SHA - 1)一起使用秘密共用金钥组合。

    youdao

  • A cryptographic hash function has the property that it is computationally infeasible to find two distinct inputs that hash to the same value.

    加密函数这样一个属性计算时不可能两个不同的输入通过哈希算法取相同的值。

    youdao

  • Each check attribute constitutes an MD5 hash (a message digest algorithm commonly used in generating cryptographic hashes) of the following concatenated string.

    每个check属性组成以下连接字符串MD 5列(一种通常用于生成加密列的消息摘要算法)。

    youdao

  • Any good cryptographic hashing algorithm should make finding a duplicate hash for an alternative plaintext difficult, even given a known message and its associated message hash.

    任何好的密码杂凑算法应该是这样的,即使给定已知讯息和与关联的讯息杂凑,也很难找到替代明码的迭代杂凑。

    youdao

  • This command will monitor the keystrokes of the currently in-focus X window and print out a cryptographic hash of the keystroke dwell times after 10 averages have been recorded across all Windows.

    条命令监视持有焦点x窗口所有窗口中记录10平均数输出击键停顿时间密码散列

    youdao

  • A hash is the result of a cryptographic function that takes an arbitrarily sized string of data, performs a mathematical encryption function on it, and returns a fixed-size string.

    哈希加密功能所获得结果,这种加密需要获取任意大小字符串数据,并用算法进行加密然后返回一个固定大小的字符串。

    youdao

  • To preserve bandwidth between the nodes (likely a constrained resource), DRBD doesn't move data between nodes to validate but instead moves cryptographic digests of the data (hash).

    为了保护节点带宽可能是一个受限资源),DRBD需要在节点间移动数据进行验证而是移动数据(hash加密摘要

    youdao

  • The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.

    签发机构证书“签名”,通过一种密码算法产生的散列值。

    youdao

  • Secure hash algorithms are important tools for cryptographic applications such as digital signatures.

    安全散列算法数字签名密码学应用中重要工具

    youdao

  • Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.

    生成一个新的公钥对吗?加密服务提供程序密钥长度散列算法设置都会保留

    youdao

  • MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.

    MD 5个“加密函数因为生成一个具有特定给定散列信息非常困难

    youdao

  • MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.

    MD 5个“加密函数因为生成一个具有特定给定散列信息非常困难

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定