hashing algorithms 中文意思是什麼

hashing algorithms 解釋
散列演算法
  • hashing : 犬兔追逐游戲〈為世界各地英國僑民所喜愛,游戲時跑在前面的人沿途撒下紙片、粉劑等,大批人尾隨其後跟蹤追趕〉。
  • algorithms : 演算法式
  1. The general purpose hash function algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the c + + programming language

    通用哈希函數運演算法則庫包括一系列通常使用的附加的或者循環的字元竄散列法運演算法則,在c + +程序語言中。
  2. Hashing algorithms produce unique binary message digests based on the code they sign

    根據要簽名的代碼,散列演算法產生唯一的二進制消息摘要。
  3. Chapter 3 implements the simulation of traditional dispatching algorithms ( wrr, url hashing and lard ), and analyses their performance character based on the result of simulation

    第三章對典型的三種分發演算法( wrr 、 urlhashing 、 lard )作了性能上的模擬。
  4. Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing

    課程主題包含了:排序、搜尋樹、堆積及雜湊;各個擊破法、動態規劃、攤提分析、圖論演演算法、最短路徑、網路流量、計算幾何、數論演演算法;多項式及矩陣的運算;快取及平行計算。
  5. Specifies all the hash algorithms used for hashing files and for generating the strong name

    指定用於哈希文件和用於生成強名稱的所有哈希演算法。
  6. Hashing algorithms are one - way functions

    雜湊演演算法是單向函數。
  7. Using hashing algorithms for data integrity and authentication

    將雜湊演演算法用於資料完整性和認證
  8. Most hashing algorithms that people use in practice are published and well - understood

    人們在實務中使用的大多數雜湊演演算法是公開發布和為人熟知的。
  9. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms

    大多數數位簽章系統將公鑰密碼學和密碼雜湊演演算法結合使用。
  10. In this installment, they turn to common approaches to data integrity and authentication, starting with hashing algorithms

    在這一部分中,他們從介紹雜湊演演算法開始,致力於研究用於資料完整性和認證的常用方法。
  11. That is, the language vendor can use any of the hashing algorithms known to the debugger to calculate the checksum

    即,語言供應商可以使用調試器已知的任何哈希演算法計算校驗和。
  12. Hashing data is useful when you want to prevent tampering by checking that data has not been altered : given identical input strings, hashing algorithms always produce identical short output values that can easily be compared

    如果要通過檢查數據是否已更改來避免數據被篡改,哈希數據非常有用:如果輸入字元串相同,哈希演算法總是生成相同的短輸出值,可以很容易進行比較。
  13. This property identifies all cryptographic functions involved in creating an xml digital signature, including hashing, public key algorithms, message authentication codes macs, and padding

    此屬性標識創建xml數字簽名時涉及到的所有加密功能,包括哈希演算法、公鑰演算法、消息身份驗證代碼( mac )和填充。
  14. System cryptography : use fips compliant algorithms for encryption, hashing, and signing

    :系統加密:使用fips兼容的演算法來加密、哈希計算和簽名
分享友人