hash algorithm 中文意思是什麼

hash algorithm 解釋
哈希演算法
  • hash : n 1 切碎的食物〈尤指肉丁和洋芋丁〉。2 拼湊起來的東西;大雜燴。3 重申,復述,推敲。4 〈蘇格蘭語〉...
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. An unsigned integer representing the hash algorithm

    表示哈希演算法的無符號整數。
  2. For supporting multilevel embedding domains, linear table instead of multilevel table is used to make the implementing of information tables management ( such as symbol table and constant table management ) simple and effective. to fulfill the searching algorithm of symbol table and constant table, an assistant table is introduced to solve the problem caused by the use of hash algorithm

    在信息表管理方面,沒有採用多級的表組織方式,而採用了線性的表組織方式,簡單高效地實現了對作用域多層嵌套的支持;在表的查找演算法的實現中,通過輔助表的引入,解決了符號表和常量表的順序填寫法與hash演算法中表項記錄的hash函數定位法之間的矛盾這一難點。
  3. The hash algorithm name to use to derive the key

    用於導出密鑰的哈希演算法名稱。
  4. The hash algorithm to use for the membership condition

    用於成員條件的哈希演算法。
  5. Gets or sets the key to use in the hash algorithm

    獲取或設置用於哈希演算法的密鑰。
  6. Specifies the hash algorithm for the digital signature algorithm

    指定數字簽名演算法(
  7. This property is the key for the keyed hash algorithm

    此屬性是鍵控哈希演算法的密鑰。
  8. Hash algorithm for the input data using the managed library

    使用託管庫計算輸入數據的
  9. Computes the hash value of a subset of the specified byte array using the specified hash algorithm, and signs the resulting hash value

    使用指定的哈希演算法計算指定位元組數組子集的哈希值,並對結果哈希值簽名。
  10. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  11. Loads an assembly given its file name or path, security evidence hash value, and hash algorithm

    通過給定程序集文件名或路徑、安全證據哈希值及哈希演算法來加載程序集。
  12. Gets or sets the hash algorithm used by the assembly manifest

    獲取或設置程序集清單使用的哈希演算法。
  13. In the hash algorithm for which to compute the buffer size

    [ in ]為其計算緩沖區大小的哈希演算法。
  14. In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm

    4 .目前的hash雜湊演算法通常在數據壓縮方面採用的是串列迭代方式,不能進行并行計算。
  15. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了雜湊函數機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的雜湊輪函數,並利用這些雜湊輪函數,在原sha - 1雜湊函數的基礎上,設計出了新的雜湊演算法csha 。
  16. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure

    本文重點研究了在電子公文的數字簽名問題,主要從雜湊演算法和針對公文流轉的數字簽名協議,以及基於pki公鑰基礎設施的密鑰管理三個方面進行了討論,本文的主要工作包括: 1
  17. For a 64 - bit hash algorithm, she would select 33 places in each document

    對於64位元雜湊演演算法,她將在每份文件中選擇33個地方。
  18. Neither sha - 1 nor the gost hash algorithm has intellectual property restrictions of any significance

    Sha - 1或gost雜湊演演算法都沒有任何知識產權限制。
  19. One good example is the gost hash algorithm, derived from the gost cipher, with a hash length of 256 bits

    Gost雜湊演演算法是個好範例,它從gost加密術派生而來,帶有256位的雜湊長度。
  20. Then analyses the security and speed performance of md5, which is a representative one - way hash algorithm. points out its limitation and puts forward improved schemes. finally, analyses, designs and realizes the authentication mechanism of electronic commerce with improved md5

    之後介紹了在認證中要使用的單向哈希演算法,描述了其作用及設計準則,並重點討論了代表性的演算法md5 ,分析了其安全和速度性能,並針對其缺陷提出了自己的改進意見。
分享友人