• 以下表中选择一种散列算法

    Select a hash algorithm from the following list.

    youdao

  • 首先,对所分发代码应用散列算法

    First, the hashing algorithm is applied to the code they wish to distribute.

    youdao

  • 散列算法计算机安全起着举足轻重作用

    Hash algorithms are very important functions in computer security.

    youdao

  • 取而代之的是,使用一种单向散列算法避免密码被提取

    Instead, use a one-way hashing algorithm to prevent password extraction.

    youdao

  • 应用分区散列算法代价与分区键的规模成比例

    The cost of applying the partitioning hash algorithm is proportional to the size of the partitioning key.

    youdao

  • 顾名思义部分散列算法存储查找

    As the name implies, the hash part USES a hash algorithm to store and find its keys.

    youdao

  • 一些厂商结合算法减少碰撞可能性

    Some vendors combine hash algorithms to reduce the possibility of a hash collision.

    youdao

  • 针对这些破译方法提出基于MD5迭代散列算法

    In response to these decoding methods, it proposes an iterative algorithm based on MD5.

    youdao

  • 基础分析MD5散列算法弱点及其破译手段

    On this basis, it analyzes MD5 message digest encryption weaknesses and deciphering means.

    youdao

  • 选择IPSec隧道中加密数据所用加密算法散列算法

    Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.

    youdao

  • 这种散列算法及其推广可以好地运用某些分布数据排序

    The hash algorithm and its improvement can be used in sorting data with some distributions much better.

    youdao

  • 通过组合使用不同密钥长度散列算法IBMNAS提供1示的加密类型

    With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.

    youdao

  • 算法应用分区产生0 到 4095之间一个分区

    The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.

    youdao

  • 性能测试结果表明密码算法单向列算法SDTA结构上获得好的性能。

    The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.

    youdao

  • 介绍MD 5算法对它的安全性能分析提出了个基于MD5键控散列算法

    This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    youdao

  • 本文讨论算法中一值的选取并分析比较加盐值所得到不同加密效果

    This paper discusses choosing a salt figure based on hashing algorithm, analyzes and compares the different encryption effects with salt figure or without salt figure.

    youdao

  • 本文讨论算法中一种盐值选取,并分析比较加与不加盐值所得到的不同的加密效果

    This article consists of five parts: search algorithm, flowchart, hash search function, heuristic search, and experimental results.

    youdao

  • memcached客户机不必决定信息,它只需对在存储信息指定使用一个简单散列算法

    Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.

    youdao

  • 生成一个新的公钥对吗?加密服务提供程序密钥长度散列算法设置都会保留

    Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.

    youdao

  • 并且这些体系所使用算法实质上都串行因而加密数据,加密运算时光越长。

    Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes.

    youdao

  • 插件应用程序使用MD 5算法明文密码进行计算,数据库存储散列形式的密码。

    Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.

    youdao

  • 二进制加载期间,系统加载程序调用te子系统使用SHA- 256算法计算散列值。

    During binary loading, the te sub system is called by the system loader, which calculates the hash using the SHA-256 hash algorithm.

    youdao

  • 本文提出构造映射函数实现数据排序算法,从理论上对映射函数一般构造进行分析研究

    In this paper we propose a hash sort algorithm and study the general structure of its mapping function theoretically.

    youdao

  • 相反全局变量通常放在一些特定的内存位置优化编译器散列算法这样使得优化变得不可行。

    In contrast, global variables are often placed in memory locations that are designed to optimize the compiler's hashing algorithms, thus eliminating potential optimizations.

    youdao

  • 任何接收消息的人都可以消息使用相同散列算法然后使用公开密匙解密附带已加密摘要比较两者的

    Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.

    youdao

  • 如果优化程序检测到在查询执行过程可能会出现内存不足情况将避免使用重复散列算法生成访问计划

    The optimizer avoids generating access plans using the hash distinct algorithm if it detects that a low memory situation may occur during query execution.

    youdao

  • 然而使用SHA - 1存在一定缺陷散列算法情况下拥有充裕资源的攻击者确实能够实现这种碰撞结果

    However, in the case of the use of SHA-1, such as the existence of certain defects in the hash algorithm, with abundant resources of the attacker is able to achieve this kind of collision results.

    youdao

  • 想要memcached服务器存储获取信息时,memcached客户机就会一个一致散列算法这个获取一个数值

    When you store or get information from a list of memcached servers, the memcached client derives a numerical value from the key using a consistent hashing algorithm.

    youdao

  • hashcash提出质询的方式通过安全算法(SecureHash Algorithm)进行时,要求minters生成 一个字符串戳记,stamps),它们散列很多前导零。

    The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.

    youdao

  • hashcash提出质询的方式通过安全算法(SecureHash Algorithm)进行时,要求minters生成 一个字符串戳记,stamps),它们散列很多前导零。

    The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定