散列函 的英文怎麼說

中文拼音 [sǎnlièhán]
散列函 英文
hash function
  • : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : 名詞1. [書面語] (匣; 封套) case; envelope 2. (信件) letter 3. (姓氏) a surname
  1. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。
  2. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。
  3. Md5 message - digest algorithm 5 ; rfc 1321 is a widely used cryptographic hash function with a 128 - bit hash value

    Md5 (消息摘要演算法5 ; rfc 1321 )是一種廣泛應用的加密散列函數,使用了128位的值。
  4. Understand secret key, public key, one - way hash functions

    了解秘鑰、公鑰、單向散列函
  5. First, considering the characteristics of mining association rules, an effective hash function is constructed and its constructional principles, realizable methods and efficiencies are analysed, studied, discussed and proved in detail and at the same time several new concepts such as radix - scale degree, combination - existence degree, combination - denseness degree and so on are defined too

    技術部分針對關聯規則數據挖掘的特點構造了一個有效的散列函數,在對它的構造原理、實現方法和效率等進行詳細地分析、研究和論證的同時,還提出了「基規模度」 、 「組合存在度」 、 「組合稠密度」等幾個新的概念。
  6. Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography

    加密是確保安全的關鍵技術之一,本文討論了幾種典型的加密演算法,包括分組加密、公鑰加密、散列函數。
  7. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  8. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。
  9. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。
  10. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排碼加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。
  11. Information technology - security techniques - hash - functions part 2 : hash - functions using an n - bit block cipher

    信息技術安全技術散列函數第2部分:採用n位塊密碼的散列函
  12. Information technology - security techniques - hash - functions - part 2 : hash - functions using an n - bit block cipher

    信息技術.安全技術.散列函數.第2部分:使用n位塊密碼的散列函
  13. Finally, we analysis the hash function that we constructed, and find the hash function has good randomicity and collision - avoided

    最後,通過分析說明本文所構造的單向散列函數具有良好的隨機性和抗碰撞性。
  14. Information technology - security techniques - hash - functions - part 4 : hash - functions using modular arithmetic

    信息技術.安全技術.散列函數.第4部分:模數計算用散列函
  15. In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric - key cryptography, public - key cryptography, hash functions and key management protocols

    第二章介紹基本的應用密碼學演算法和密碼協議,包括對稱加密演算法、非對稱加密演算法、散列函數、數字簽名技術和密鑰管理協議。
  16. The paper analyzes the one - way hash function ( sha - 1 ) and study the process of gaining keks from ak using sha - 1. this paper discusses the state models of key management protocol in bpi + system and key usage

    分析討論了單向散列函數的安全演算法( sha - 1 ) ,研究了ak進行必要的填充后使用sha - 1得到密鑰加密密鑰( kek )的過程。
  17. Information technology - security techniques - hash - function - part 1 : general

    信息技術安全技術散列函數第1部分:概述
  18. Information technology - security techniques - hash - functions - part 1 : general

    信息技術.安全技術.散列函數.第1部分:總則
  19. Information technology - security techniques - hash functions - part 1 : general

    信息技術.安全技術.散列函數.第1部分:總則
  20. So every extra little bit of overhead in your hash function can be a bottleneck

    因此,散列函數中每一點多餘的開銷都可能成為瓶頸。
分享友人