雜湊數 的英文怎麼說

中文拼音 [còushǔ]
雜湊數 英文
hash number
  • : Ⅰ形容詞(多種多樣的; 混雜的) miscellaneous; varied; sundry; mixed Ⅱ動詞(混合在一起; 攙雜) mix; blend; mingle
  • : 動詞1 (聚集) gather [put] together; pool; collect 2 (碰; 趕; 趁) happen by chance; take advan...
  • : 數副詞(屢次) frequently; repeatedly
  1. Topics covered include : randomized computation ; data structures ( hash tables, skip lists ) ; graph algorithms ( minimum spanning trees, shortest paths, minimum cuts ) ; geometric algorithms ( convex hulls, linear programming in fixed or arbitrary dimension ) ; approximate counting ; parallel algorithms ; online algorithms ; derandomization techniques ; and tools for probabilistic analysis of algorithms

    主題包括?隨機計算、資料結構(表、省略串列) 、圖論演演算法(最小擴張樹,最短路徑,最少切割) 、幾何演演算法(凸殼、在固定或任意維度的線性規劃) 、近似計、平行演演算法、線上演演算法、消去隨機技術,以及演演算法的機率分析工具。
  2. Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing

    課程主題包含了:排序、搜尋樹、堆積及;各個擊破法、動態規劃、攤提分析、圖論演演算法、最短路徑、網路流量、計算幾何、論演演算法;多項式及矩陣的運算;快取及平行計算。
  3. Hash functions usually produce constant - sized digests

    通常產生恆定大小的摘要。
  4. Hashing algorithms are one - way functions

    演演算法是單向函
  5. That s much more efficient than a brute - force attack, where the expected number of messages she would have to hash is

    這比蠻力攻擊要有效得多,如果使用蠻力攻擊,預計她必須的訊息為2
  6. For a big bit hash, try using a symmetric cipher adapted to perform hashing

    對于大位,嘗試使用適合於執行法的對稱加密術。
  7. Hash functions will be adopted to ensure the integrity of data

    系統同時會採用功能,以確保資料的完整性。
  8. Also, two different messages cannot produce the same hash results

    此外,兩個不同的信息不會得出相同的
  9. Sha - 1, which gives a 160 - bit hash, is a good hash function to use

    Sha - 1提供160位,是一種可以使用的好
  10. Hash functions will also be adopted to protect the integrity of data

    系統同時會採用功能,以確保資料的完整性。
  11. You can use hash functions to ensure data integrity, much like a traditional checksum

    可以使用來確保資料完整性,這很像傳統的校驗和。
  12. The local router checks the response against its own calculation of the expected hash value

    本地路由器對照自己計算期待值來檢查回覆。
  13. Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms

    密碼可以用做老式校驗和演演算法的隨便替代物。
  14. In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm

    4 .目前的hash演算法通常在據壓縮方面採用的是串列迭代方式,不能進行并行計算。
  15. In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al

    Hash函也稱演算法就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種函
  16. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的輪函,並利用這些輪函,在原sha - 1的基礎上,設計出了新的演算法csha 。
  17. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure

    本文重點研究了在電子公文的字簽名問題,主要從演算法和針對公文流轉的字簽名協議,以及基於pki公鑰基礎設施的密鑰管理三個方面進行了討論,本文的主要工作包括: 1
  18. Most hashing algorithms that people use in practice are published and well - understood

    人們在實務中使用的大多演演算法是公開發布和為人熟知的。
  19. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms

    大多位簽章系統將公鑰密碼學和密碼演演算法結合使用。
  20. Most of the time, there are infinitely many different strings that can produce the exact same hash value

    大多時候,幾乎有無窮多個不同的字串可以產生完全相同的值。
分享友人