从以下列表中选择一种散列算法。
首先,对所要分发的代码应用散列算法。
First, the hashing algorithm is applied to the code they wish to distribute.
散列算法对计算机安全起着举足轻重的作用。
Hash algorithms are very important functions in computer security.
取而代之的是,使用一种单向散列算法来避免密码被提取。
Instead, use a one-way hashing algorithm to prevent password extraction.
应用分区散列算法的代价与分区键的规模成比例。
The cost of applying the partitioning hash algorithm is proportional to the size of the partitioning key.
顾名思义,散列部分用散列算法存储及查找它的键。
As the name implies, the hash part USES a hash algorithm to store and find its keys.
一些厂商结合散列算法,以减少哈希碰撞的可能性。
Some vendors combine hash algorithms to reduce the possibility of a hash collision.
针对这些破译方法提出基于MD5的迭代散列算法。
In response to these decoding methods, it proposes an iterative algorithm based on MD5.
在此基础上分析MD5散列算法的弱点及其破译手段。
On this basis, it analyzes MD5 message digest encryption weaknesses and deciphering means.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
这种散列算法及其推广可以很好地运用于某些分布的数据排序。
The hash algorithm and its improvement can be used in sorting data with some distributions much better.
通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。
With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.
散列算法应用于分区键的值,产生0 到 4095之间的一个分区号。
The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.
性能测试的结果表明密码算法和单向散列算法在SDTA结构上获得了较好的性能。
The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.
介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.
本文讨论散列算法中一种盐值的选取,并分析比较加与不加盐值所得到的不同的加密效果。
This paper discusses choosing a salt figure based on hashing algorithm, analyzes and compares the different encryption effects with salt figure or without salt figure.
本文讨论散列算法中一种盐值的选取,并分析比较加与不加盐值所得到的不同的加密效果。
This article consists of five parts: search algorithm, flowchart, hash search function, heuristic search, and experimental results.
memcached客户机不必决定此信息,它只需对在存储信息时指定的键使用一个简单的散列算法。
Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.
要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。
Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.
并且这些体系所使用散列算法在实质上都是串行的,因而待加密数据越长,加密运算时光越长。
Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes.
插件应用程序使用MD 5散列算法对明文密码进行散列计算,并在数据库中存储散列形式的密码。
Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.
在二进制加载期间,系统加载程序调用te子系统,并使用SHA- 256散列算法来计算散列值。
During binary loading, the te sub system is called by the system loader, which calculates the hash using the SHA-256 hash algorithm.
本文提出用构造映射函数实现数据排序的散列算法,从理论上对映射函数的一般构造进行分析和研究。
In this paper we propose a hash sort algorithm and study the general structure of its mapping function theoretically.
相反,全局变量通常放在一些特定的内存位置,以优化编译器的散列算法,这样就使得优化变得不可行。
In contrast, global variables are often placed in memory locations that are designed to optimize the compiler's hashing algorithms, thus eliminating potential optimizations.
任何接收此消息的人都可以对该消息使用相同的散列算法,然后使用您的公开密匙解密附带的已加密摘要,并比较两者的值。
Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.
如果优化程序检测到在查询执行过程中可能会出现内存不足的情况,它将避免使用非重复散列算法生成访问计划。
The optimizer avoids generating access plans using the hash distinct algorithm if it detects that a low memory situation may occur during query execution.
然而,在使用SHA - 1等存在一定缺陷的散列算法的情况下,拥有充裕资源的攻击者确实能够实现这种碰撞结果。
However, in the case of the use of SHA-1, such as the existence of certain defects in the hash algorithm, with abundant resources of the attacker is able to achieve this kind of collision results.
当想要从一列memcached服务器存储或获取信息时,memcached客户机就会用一个一致的散列算法从这个键获取一个数值。
When you store or get information from a list of memcached servers, the memcached client derives a numerical value from the key using a consistent hashing algorithm.
hashcash提出质询的方式是,当通过安全散列算法(SecureHash Algorithm)进行散列时,要求“minters”生成 一个字符串(戳记,stamps),在它们的散列中有很多前导零。
The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.
hashcash提出质询的方式是,当通过安全散列算法(SecureHash Algorithm)进行散列时,要求“minters”生成 一个字符串(戳记,stamps),在它们的散列中有很多前导零。
The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.
应用推荐