雜湊函數 的英文怎麼說

中文拼音 [còuhánshǔ]
雜湊函數 英文
hash function
  • : Ⅰ形容詞(多種多樣的; 混雜的) miscellaneous; varied; sundry; mixed Ⅱ動詞(混合在一起; 攙雜) mix; blend; mingle
  • : 動詞1 (聚集) gather [put] together; pool; collect 2 (碰; 趕; 趁) happen by chance; take advan...
  • : 名詞1. [書面語] (匣; 封套) case; envelope 2. (信件) letter 3. (姓氏) a surname
  • : 數副詞(屢次) frequently; repeatedly
  • 函數 : [數學] function函數計算機 function computer; 函數計算器 function calculator; 函數運算 functional operation
  1. Hash functions usually produce constant - sized digests

    雜湊函數通常產生恆定大小的摘要。
  2. Hashing algorithms are one - way functions

    演演算法是單向
  3. Hash functions will be adopted to ensure the integrity of data

    系統同時會採用雜湊函數功能,以確保資料的完整性。
  4. Also, two different messages cannot produce the same hash results

    此外,兩個不同的信息不會得出相同的雜湊函數
  5. Sha - 1, which gives a 160 - bit hash, is a good hash function to use

    Sha - 1提供160位,是一種可以使用的好雜湊函數
  6. Hash functions will also be adopted to protect the integrity of data

    系統同時會採用雜湊函數功能,以確保資料的完整性。
  7. You can use hash functions to ensure data integrity, much like a traditional checksum

    可以使用雜湊函數來確保資料完整性,這很像傳統的校驗和。
  8. The local router checks the response against its own calculation of the expected hash value

    本地路由器對照自己計算期待雜湊函數值來檢查回覆。
  9. Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms

    密碼雜湊函數可以用做老式校驗和演演算法的隨便替代物。
  10. In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al

    Hash也稱雜湊函數演算法就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種
  11. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了雜湊函數機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的,並利用這些,在原sha - 1雜湊函數的基礎上,設計出了新的演算法csha 。
  12. Cryptography technology provides the basis for such a mechanism. symmetric cryptosystems can provide privacy service ; hash functions and message authentication codes can provide integrity service ; asymmetric cryptosystems ( public key cryptosystems ) can provide authentication service

    對稱密鑰密碼技術提供了機密性服務;雜湊函數和消息認證碼提供了完整性服務;非對稱密鑰密碼技術(公鑰密碼技術)提供了身份認證服務。
  13. The analysis is relatively simple due to the good approximation and the compact expression of the spline function

    由於樣條有良好的逼近性及緊性,使得層合板在脈動流這種復荷載作用下的動力分析也相對簡單。
  14. Another property of a good hash function is that the output will not reflect the input in any discernable way

    好的雜湊函數的另一個特性是輸出不以任何可辨認的方式反應輸入。
  15. The hash function that van lunteren devised for routing became essential for ibm ' s stream processor

    范盧特倫為路由設計的雜湊函數,遂成為ibm串流處理器的要件。
  16. We found that the derived conditions for the desired collision differential path were not sufficient to guarantee the path to hold and that some conditions could be modified to enlarge the collision set. by using technique of small range searching and omitting the computing steps to check the characteristics in the attack algorithm, we can speed up the attack of md5 efficiently. compared with the advanced message modification technique presented by wang - it et al.,

    一個安全的雜湊函數應該至少滿足以下幾個條件對每一個給定的輸入消息串,計算輸出的hash值即消息摘要是很容易的對任意給定的某一hash值h ,找到一個輸入消息串m ,使得其計算輸出的hash值剛好等於h是計算上不可行的找到任意兩個不同的輸入消息串映射到同一個hash值是計算上不可行的。
  17. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。
  18. An earlier version of this paper appears in lecture notes in computer science, krawczyk h ed.,

    其中tcrv假設是雜湊函數抗原像攻擊屬性的一種變形表述方式。
  19. It is generated by the transformation of the electronic record using asymmetric cryptography and a hash function

    而該簽署是用非對稱密碼技術及雜湊函數,將該電子記錄作據變換而產生。
  20. A one - way algorithm which maps or translates one set of bits into another ( generally smaller ) in such a way that the algorithm yields the same hash results every time for the same message, and it is computationally infeasible for a message to be reconstituted from the hash result

    可以配對或轉化一組位元為另一組位元(通常是較小的)的單向演算法,使每次均可得出該信息的同一個雜湊函數,而且不可以經由雜湊函數重整得出該信息。
分享友人