hash function 中文意思是什麼

hash function 解釋
哈希函數
  • hash : n 1 切碎的食物〈尤指肉丁和洋芋丁〉。2 拼湊起來的東西;大雜燴。3 重申,復述,推敲。4 〈蘇格蘭語〉...
  • function : n 1 功能,官能,機能,作用。2 〈常 pl 〉職務,職責。3 慶祝儀式;(盛大的)集會,宴會。4 【數學】...
  1. The general purpose hash function algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the c + + programming language

    通用哈希函數運演算法則庫包括一系列通常使用的附加的或者循環的字元竄散列法運演算法則,在c + +程序語言中。
  2. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。
  3. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。
  4. Md5 message - digest algorithm 5 ; rfc 1321 is a widely used cryptographic hash function with a 128 - bit hash value

    Md5 (消息摘要演算法5 ; rfc 1321 )是一種廣泛應用的加密散列函數,使用了128位的散列值。
  5. Improved collision attack on hash function md5

    Md5 - hash函數的碰撞攻擊的改進
  6. Serves as a hash function for a particular type

    用作特定類型的哈希函數。
  7. The basic requirements for a cryptographic hash function are

    加密哈希函數的基本要求是:
  8. Serves as a hash function for this object

    作為此對象的哈希函數。
  9. Serves as a hash function for the current

    對象的一個哈希函數。
  10. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  11. First, considering the characteristics of mining association rules, an effective hash function is constructed and its constructional principles, realizable methods and efficiencies are analysed, studied, discussed and proved in detail and at the same time several new concepts such as radix - scale degree, combination - existence degree, combination - denseness degree and so on are defined too

    散列技術部分針對關聯規則數據挖掘的特點構造了一個有效的散列函數,在對它的構造原理、實現方法和效率等進行詳細地分析、研究和論證的同時,還提出了「基規模度」 、 「組合存在度」 、 「組合稠密度」等幾個新的概念。
  12. Macs. 2 : information technology - security techniques - message authentication codes - part 2 : mechanisms using a dedicated hash - function

    信息技術.安全技術.文電鑒別碼
  13. With the utilization of hash function, ip and adaptive probability, a hash - based packet - marking tracing engine is designed

    本文利用hash函數, ip報頭和自適應概率特性,設計了基於hash函數的數據包標記追蹤引擎。
  14. A hash - based message authentication code hmac uses a hash function where data is hashed by iterating a basic compression function on blocks of data

    基於哈希的消息驗證代碼( hmac )使用一個哈希函數,通過在數據塊上迭代基本壓縮函數來計算數據的哈希值。
  15. Macs. information technology - security techniques - message authentication codes - mechanisms using a dedicated hash - function

    信息技術.安全性技術.電文鑒別代碼
  16. It is possible for a hash function to generate the same hash code for two different keys, but a hash function that generates a unique hash code for each unique key results in better performance when retrieving elements from the hash table

    一個哈希函數能夠為兩個不同的鍵生成相同的哈希代碼,但從哈希表檢索元素時,為每一唯一鍵生成唯一哈希代碼的哈希函數將令性能更佳。
  17. Sha - 1, which gives a 160 - bit hash, is a good hash function to use

    Sha - 1提供160位雜湊,是一種可以使用的好雜湊函數。
  18. In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al

    Hash函數也稱雜湊函數或雜湊演算法就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種函數。
  19. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了雜湊函數機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的雜湊輪函數,並利用這些雜湊輪函數,在原sha - 1雜湊函數的基礎上,設計出了新的雜湊演算法csha 。
  20. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密碼,還包括流密碼、 hash函數、消息認證碼、數字簽名和公鑰加密等在內的強安全性的密碼標準。
分享友人