雜湊數 的英文怎麼說
中文拼音 [zácòushǔ]
雜湊數
英文
hash number-
Topics covered include : randomized computation ; data structures ( hash tables, skip lists ) ; graph algorithms ( minimum spanning trees, shortest paths, minimum cuts ) ; geometric algorithms ( convex hulls, linear programming in fixed or arbitrary dimension ) ; approximate counting ; parallel algorithms ; online algorithms ; derandomization techniques ; and tools for probabilistic analysis of algorithms
主題包括?隨機計算、資料結構(雜湊表、省略串列) 、圖論演演算法(最小擴張樹,最短路徑,最少切割) 、幾何演演算法(凸殼、在固定或任意維度的線性規劃) 、近似計數、平行演演算法、線上演演算法、消去隨機技術,以及演演算法的機率分析工具。Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing
課程主題包含了:排序、搜尋樹、堆積及雜湊;各個擊破法、動態規劃、攤提分析、圖論演演算法、最短路徑、網路流量、計算幾何、數論演演算法;多項式及矩陣的運算;快取及平行計算。Hash functions usually produce constant - sized digests
雜湊函數通常產生恆定大小的摘要。Hashing algorithms are one - way functions
雜湊演演算法是單向函數。That s much more efficient than a brute - force attack, where the expected number of messages she would have to hash is
這比蠻力攻擊要有效得多,如果使用蠻力攻擊,預計她必須雜湊的訊息數為2For a big bit hash, try using a symmetric cipher adapted to perform hashing
對于大位數雜湊,嘗試使用適合於執行雜湊法的對稱加密術。Hash functions will be adopted to ensure the integrity of data
系統同時會採用雜湊函數功能,以確保資料的完整性。Also, two different messages cannot produce the same hash results
此外,兩個不同的信息不會得出相同的雜湊函數。Sha - 1, which gives a 160 - bit hash, is a good hash function to use
Sha - 1提供160位雜湊,是一種可以使用的好雜湊函數。Hash functions will also be adopted to protect the integrity of data
系統同時會採用雜湊函數功能,以確保資料的完整性。You can use hash functions to ensure data integrity, much like a traditional checksum
可以使用雜湊函數來確保資料完整性,這很像傳統的校驗和。The local router checks the response against its own calculation of the expected hash value
本地路由器對照自己計算期待雜湊函數的數值來檢查回覆。Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms
密碼雜湊函數可以用做老式校驗和演演算法的隨便替代物。In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm
4 .目前的hash雜湊演算法通常在數據壓縮方面採用的是串列迭代方式,不能進行并行計算。In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al
Hash函數也稱雜湊函數或雜湊演算法就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種函數。At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction
在系統分析了雜湊函數機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的雜湊輪函數,並利用這些雜湊輪函數,在原sha - 1雜湊函數的基礎上,設計出了新的雜湊演算法csha 。On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure
本文重點研究了在電子公文的數字簽名問題,主要從雜湊演算法和針對公文流轉的數字簽名協議,以及基於pki公鑰基礎設施的密鑰管理三個方面進行了討論,本文的主要工作包括: 1Most hashing algorithms that people use in practice are published and well - understood
人們在實務中使用的大多數雜湊演演算法是公開發布和為人熟知的。Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms
大多數數位簽章系統將公鑰密碼學和密碼雜湊演演算法結合使用。Most of the time, there are infinitely many different strings that can produce the exact same hash value
大多數時候,幾乎有無窮多個不同的字串可以產生完全相同的雜湊值。分享友人