散列碼 的英文怎麼說

中文拼音 [sǎnliè]
散列碼 英文
hash code
  • : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. The hash code of products and their codes are the same

    產品及其代散列碼相同
  2. Hash to get the list of searching switches makes the code shorter and more maintainable

    來得到檢索開關表會使代更短,而且容易維護。
  3. Hashing algorithms produce unique binary message digests based on the code they sign

    根據要簽名的代演算法產生唯一的二進制消息摘要。
  4. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結合的混合密體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息函數如: sha - 1 、 md4 、 md5等也進行了分析。
  5. The whitelist filter s response contains some kind of unique code that identifies the original message, such as a hash or sequential id

    「白名單」過濾器的響應包含某種唯一的可以識別原始消息的代,譬如,一個或序標識。
  6. The algorithm works by performing a series of transformations on the password and

    這個演算法使用兩個md5值對密
  7. The user s password is read from the console and sent to the md5crypt subroutine along with the hash on file from etc shadow

    用戶的密是從終端讀取的,並與從/ etc / shadow中讀取出來的文件的值( h1 )一起發送給md5crypt子常式。
  8. In this thesis, the zero correlation zone ( zcz ) or generalized orthogonal ( go ) sequences are applied to direct - sequence cdma ( ds - cdma ) systems, and the corresponding system performance are analysed. topics on the correlation property analysis of hadamard walsh ( wh ) sequences, go sequences, and loosely synchronous ( ls ) sequences are performed, and the system model and performance evaluation of single - cell and multi - cell synchronous cdma ( s - cdma ) systems employing go sequences, and the applications of go sequences in quasi - synchronous cdma ( qs - cdma ) systems are elaborated

    本文研究了零相關區( zcz )或廣義正交( go )序在直接序分多址( ds - cdma )系統中的應用並給出了系統性能分析結果,包括hadamardwalsh ( wh )序集、廣義正交序集與鬆同步( ls )序集相關特性分析,採用廣義正交序的單小區與多小區同步cdma ( s - cdma )系統模型與性能分析,以及廣義正交序在準同步cdma ( qs - cdma )系統中的應用等問題。
  9. Under normal circumstances, this new second path would follow the insertion order, meaning that the iterator for the collection will return the elements in their insertion order not in the order that their hashing codes have them incorporated into the collection, but

    正常情況下,這個新的第二路徑會遵循插入順序,這意味著集合的迭代器將按照元素的插入順序返回元素(而不按它們的散列碼將其組合成一個集合的順序) ,但
  10. This property contains the ascii - encoded sha1 hash of a mailbox uri ; this encoding is a one - way mapping and cannot be trivially reverse - engineered to give the original e - mail address

    該特性包含郵箱uri的ascii編的sha1;該編是單向映射並且不能很一般地進行逆向工程以給出原始的電子郵件地址。
  11. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密數字簽名演算法利用rsa公鑰密體制的原理、 md5單向函數和排加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。
  12. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密數字簽名演算法結合了rsa公鑰密體制、 md5單向函數和排加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。
  13. Information technology - security techniques - hash - functions part 2 : hash - functions using an n - bit block cipher

    信息技術安全技術函數第2部分:採用n位塊密函數
  14. Information technology - security techniques - hash - functions - part 2 : hash - functions using an n - bit block cipher

    信息技術.安全技術.函數.第2部分:使用n位塊密函數
  15. In this type of attack, the attacker, after gaining access to the password file, attempts to guess passwords by using software to iteratively hash all words in a large dictionary and compare the generated hashes to the stored hash

    在這種類型的攻擊中,攻擊者在獲得對密文件的訪問權限之後,通過使用軟體對一個大字典中的所有單詞反復進行運算並將生成的哈希與存儲的哈希進行比較,試圖猜出密
  16. Capicom can be used to digitally sign data, sign code, verify digital signatures, envelop data for privacy, hash data, encrypt decrypt data and more

    Capicom可用於對數據進行數字簽名、對代簽名、驗證數字簽名、包封保密數據、對數據進行處理、加密及解密數據等等。
  17. The third, do the concrete discussion to that the attestation involved in system technique and the method that encrypt, detailed discuss symmetry type password dbs in the system and single directions spread the row encrypts the md5 in the system encrypts the method

    第三,對該體系中所涉及的認證技術及加密的方法做具體討論,詳細討論了對稱式密系統中的des及單向加密系統中的md5加密方法。
  18. The hash codes of the products are the hash codes of their codes

    產品的散列碼是其代散列碼
  19. The hash codes of product codes and their string representations are the same

    產品代散列碼及其字元串表示的散列碼相同
  20. The hash codes of the product codes are the hash codes of their string representations

    產品代散列碼是其字元串表示的散列碼
分享友人