雜湊演演算法 的英文怎麼說

中文拼音 [còuyǎnyǎnsuàn]
雜湊演演算法 英文
hash multiset
  • : Ⅰ形容詞(多種多樣的; 混雜的) miscellaneous; varied; sundry; mixed Ⅱ動詞(混合在一起; 攙雜) mix; blend; mingle
  • : 動詞1 (聚集) gather [put] together; pool; collect 2 (碰; 趕; 趁) happen by chance; take advan...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. Topics covered include : randomized computation ; data structures ( hash tables, skip lists ) ; graph algorithms ( minimum spanning trees, shortest paths, minimum cuts ) ; geometric algorithms ( convex hulls, linear programming in fixed or arbitrary dimension ) ; approximate counting ; parallel algorithms ; online algorithms ; derandomization techniques ; and tools for probabilistic analysis of algorithms

    主題包括?隨機計、資料結構(表、省略串列) 、圖論(最小擴張樹,最短路徑,最少切割) 、幾何(凸殼、在固定或任意維度的線性規劃) 、近似計數、平行、線上、消去隨機技術,以及的機率分析工具。
  2. Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing

    課程主題包含了:排序、搜尋樹、堆積及;各個擊破、動態規劃、攤提分析、圖論、最短路徑、網路流量、計幾何、數論;多項式及矩陣的運;快取及平行計
  3. What s a good hashing algorithm to use

    什麼是適用的好雜湊演演算法呢?
  4. Hashing algorithms are one - way functions

    雜湊演演算法是單向函數。
  5. Using hashing algorithms for data integrity and authentication

    雜湊演演算法用於資料完整性和認證
  6. Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms

    密碼函數可以用做老式校驗和的隨便替代物。
  7. In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm

    4 .目前的hash通常在數據壓縮方面採用的是串列迭代方式,不能進行并行計
  8. In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al

    Hash函數也稱函數或就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種函數。
  9. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了函數機制后,我們利用j . seberry等人提出的方,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的輪函數,並利用這些輪函數,在原sha - 1函數的基礎上,設計出了新的csha 。
  10. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure

    本文重點研究了在電子公文的數字簽名問題,主要從和針對公文流轉的數字簽名協議,以及基於pki公鑰基礎設施的密鑰管理三個方面進行了討論,本文的主要工作包括: 1
  11. For a 64 - bit hash algorithm, she would select 33 places in each document

    對於64位元雜湊演演算法,她將在每份文件中選擇33個地方。
  12. Most hashing algorithms that people use in practice are published and well - understood

    人們在實務中使用的大多數雜湊演演算法是公開發布和為人熟知的。
  13. Neither sha - 1 nor the gost hash algorithm has intellectual property restrictions of any significance

    Sha - 1或gost雜湊演演算法都沒有任何知識產權限制。
  14. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms

    大多數數位簽章系統將公鑰密碼學和密碼雜湊演演算法結合使用。
  15. One good example is the gost hash algorithm, derived from the gost cipher, with a hash length of 256 bits

    Gost雜湊演演算法是個好範例,它從gost加密術派生而來,帶有256位的長度。
  16. In this installment, they turn to common approaches to data integrity and authentication, starting with hashing algorithms

    在這一部分中,他們從介紹雜湊演演算法開始,致力於研究用於資料完整性和認證的常用方
  17. If you publicly release a regular cryptographic hash for a document, anyone can verify the hash, assuming they know the hashing algorithm

    如果您公開發布一個文件的有規律密碼,則任何人都可以檢驗該,假設他們知道雜湊演演算法的話。
  18. A one - way algorithm which maps or translates one set of bits into another ( generally smaller ) in such a way that the algorithm yields the same hash results every time for the same message, and it is computationally infeasible for a message to be reconstituted from the hash result

    可以配對或轉化一組位元為另一組位元(通常是較小的)的單向,使每次均可得出該信息的同一個函數,而且不可以經由函數重整得出該信息。
分享友人