雜湊法 的英文怎麼說
中文拼音 [zácòufǎ]
雜湊法
英文
hashing-
Topics covered include : randomized computation ; data structures ( hash tables, skip lists ) ; graph algorithms ( minimum spanning trees, shortest paths, minimum cuts ) ; geometric algorithms ( convex hulls, linear programming in fixed or arbitrary dimension ) ; approximate counting ; parallel algorithms ; online algorithms ; derandomization techniques ; and tools for probabilistic analysis of algorithms
主題包括?隨機計算、資料結構(雜湊表、省略串列) 、圖論演演算法(最小擴張樹,最短路徑,最少切割) 、幾何演演算法(凸殼、在固定或任意維度的線性規劃) 、近似計數、平行演演算法、線上演演算法、消去隨機技術,以及演演算法的機率分析工具。Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing
課程主題包含了:排序、搜尋樹、堆積及雜湊;各個擊破法、動態規劃、攤提分析、圖論演演算法、最短路徑、網路流量、計算幾何、數論演演算法;多項式及矩陣的運算;快取及平行計算。In short, we need a way to authenticate the hash
簡而言之,我們需要一種認證雜湊的方法。What s a good hashing algorithm to use
什麼是適用的好雜湊演演算法呢?Hashing algorithms are one - way functions
雜湊演演算法是單向函數。Using hashing algorithms for data integrity and authentication
將雜湊演演算法用於資料完整性和認證Many constructions for macs do not depend on cryptographic hashing
Mac的許多構造不是取決於密碼雜湊法的。For a big bit hash, try using a symmetric cipher adapted to perform hashing
對于大位數雜湊,嘗試使用適合於執行雜湊法的對稱加密術。Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms
密碼雜湊函數可以用做老式校驗和演演算法的隨便替代物。In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm
4 .目前的hash雜湊演算法通常在數據壓縮方面採用的是串列迭代方式,不能進行并行計算。In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al
Hash函數也稱雜湊函數或雜湊演算法就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種函數。At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction
在系統分析了雜湊函數機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的雜湊輪函數,並利用這些雜湊輪函數,在原sha - 1雜湊函數的基礎上,設計出了新的雜湊演算法csha 。On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure
本文重點研究了在電子公文的數字簽名問題,主要從雜湊演算法和針對公文流轉的數字簽名協議,以及基於pki公鑰基礎設施的密鑰管理三個方面進行了討論,本文的主要工作包括: 1For a 64 - bit hash algorithm, she would select 33 places in each document
對於64位元雜湊演演算法,她將在每份文件中選擇33個地方。Most hashing algorithms that people use in practice are published and well - understood
人們在實務中使用的大多數雜湊演演算法是公開發布和為人熟知的。Neither sha - 1 nor the gost hash algorithm has intellectual property restrictions of any significance
Sha - 1或gost雜湊演演算法都沒有任何知識產權限制。Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms
大多數數位簽章系統將公鑰密碼學和密碼雜湊演演算法結合使用。One good example is the gost hash algorithm, derived from the gost cipher, with a hash length of 256 bits
Gost雜湊演演算法是個好範例,它從gost加密術派生而來,帶有256位的雜湊長度。In this installment, they turn to common approaches to data integrity and authentication, starting with hashing algorithms
在這一部分中,他們從介紹雜湊演演算法開始,致力於研究用於資料完整性和認證的常用方法。If you publicly release a regular cryptographic hash for a document, anyone can verify the hash, assuming they know the hashing algorithm
如果您公開發布一個文件的有規律密碼雜湊,則任何人都可以檢驗該雜湊,假設他們知道雜湊演演算法的話。分享友人