散列碼 的英文怎麼說
中文拼音 [sǎnlièmǎ]
散列碼
英文
hash code-
The hash code of products and their codes are the same
產品及其代碼的散列碼相同Hash to get the list of searching switches makes the code shorter and more maintainable
散列來得到檢索開關列表會使代碼更短,而且容易維護。Hashing algorithms produce unique binary message digests based on the code they sign
根據要簽名的代碼,散列演算法產生唯一的二進制消息摘要。Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5
主要論述了系統採用的rc2和rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。The whitelist filter s response contains some kind of unique code that identifies the original message, such as a hash or sequential id
「白名單」過濾器的響應包含某種唯一的可以識別原始消息的代碼,譬如,一個散列或序列標識。The algorithm works by performing a series of transformations on the password and
這個演算法使用兩個md5散列值對密碼和The user s password is read from the console and sent to the md5crypt subroutine along with the hash on file from etc shadow
用戶的密碼是從終端讀取的,並與從/ etc / shadow中讀取出來的文件的散列值( h1 )一起發送給md5crypt子常式。In this thesis, the zero correlation zone ( zcz ) or generalized orthogonal ( go ) sequences are applied to direct - sequence cdma ( ds - cdma ) systems, and the corresponding system performance are analysed. topics on the correlation property analysis of hadamard walsh ( wh ) sequences, go sequences, and loosely synchronous ( ls ) sequences are performed, and the system model and performance evaluation of single - cell and multi - cell synchronous cdma ( s - cdma ) systems employing go sequences, and the applications of go sequences in quasi - synchronous cdma ( qs - cdma ) systems are elaborated
本文研究了零相關區( zcz )或廣義正交( go )序列在直接序列碼分多址( ds - cdma )系統中的應用並給出了系統性能分析結果,包括hadamardwalsh ( wh )序列集、廣義正交序列集與鬆散同步( ls )序列集相關特性分析,採用廣義正交序列的單小區與多小區同步cdma ( s - cdma )系統模型與性能分析,以及廣義正交序列在準同步cdma ( qs - cdma )系統中的應用等問題。Under normal circumstances, this new second path would follow the insertion order, meaning that the iterator for the collection will return the elements in their insertion order not in the order that their hashing codes have them incorporated into the collection, but
正常情況下,這個新的第二路徑會遵循插入順序,這意味著集合的迭代器將按照元素的插入順序返回元素(而不按它們的散列碼將其組合成一個集合的順序) ,但This property contains the ascii - encoded sha1 hash of a mailbox uri ; this encoding is a one - way mapping and cannot be trivially reverse - engineered to give the original e - mail address
該特性包含郵箱uri的ascii編碼的sha1散列;該編碼是單向映射並且不能很一般地進行逆向工程以給出原始的電子郵件地址。The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time
保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed
保密散列數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排列碼加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。Information technology - security techniques - hash - functions part 2 : hash - functions using an n - bit block cipher
信息技術安全技術散列函數第2部分:採用n位塊密碼的散列函數Information technology - security techniques - hash - functions - part 2 : hash - functions using an n - bit block cipher
信息技術.安全技術.散列函數.第2部分:使用n位塊密碼的散列函數In this type of attack, the attacker, after gaining access to the password file, attempts to guess passwords by using software to iteratively hash all words in a large dictionary and compare the generated hashes to the stored hash
在這種類型的攻擊中,攻擊者在獲得對密碼文件的訪問權限之後,通過使用軟體對一個大字典中的所有單詞反復進行散列運算並將生成的哈希與存儲的哈希進行比較,試圖猜出密碼。Capicom can be used to digitally sign data, sign code, verify digital signatures, envelop data for privacy, hash data, encrypt decrypt data and more
Capicom可用於對數據進行數字簽名、對代碼簽名、驗證數字簽名、包封保密數據、對數據進行散列處理、加密及解密數據等等。The third, do the concrete discussion to that the attestation involved in system technique and the method that encrypt, detailed discuss symmetry type password dbs in the system and single directions spread the row encrypts the md5 in the system encrypts the method
第三,對該體系中所涉及的認證技術及加密的方法做具體討論,詳細討論了對稱式密碼系統中的des及單向散列加密系統中的md5加密方法。The hash codes of the products are the hash codes of their codes
產品的散列碼是其代碼的散列碼。The hash codes of product codes and their string representations are the same
產品代碼的散列碼及其字元串表示的散列碼相同The hash codes of the product codes are the hash codes of their string representations
產品代碼的散列碼是其字元串表示的散列碼。分享友人