雜湊法 的英文怎麼說

中文拼音 [còu]
雜湊法 英文
hashing
  • : Ⅰ形容詞(多種多樣的; 混雜的) miscellaneous; varied; sundry; mixed Ⅱ動詞(混合在一起; 攙雜) mix; blend; mingle
  • : 動詞1 (聚集) gather [put] together; pool; collect 2 (碰; 趕; 趁) happen by chance; take advan...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. Topics covered include : randomized computation ; data structures ( hash tables, skip lists ) ; graph algorithms ( minimum spanning trees, shortest paths, minimum cuts ) ; geometric algorithms ( convex hulls, linear programming in fixed or arbitrary dimension ) ; approximate counting ; parallel algorithms ; online algorithms ; derandomization techniques ; and tools for probabilistic analysis of algorithms

    主題包括?隨機計算、資料結構(表、省略串列) 、圖論演演算(最小擴張樹,最短路徑,最少切割) 、幾何演演算(凸殼、在固定或任意維度的線性規劃) 、近似計數、平行演演算、線上演演算、消去隨機技術,以及演演算的機率分析工具。
  2. Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing

    課程主題包含了:排序、搜尋樹、堆積及;各個擊破、動態規劃、攤提分析、圖論演演算、最短路徑、網路流量、計算幾何、數論演演算;多項式及矩陣的運算;快取及平行計算。
  3. In short, we need a way to authenticate the hash

    簡而言之,我們需要一種認證的方
  4. What s a good hashing algorithm to use

    什麼是適用的好演演算呢?
  5. Hashing algorithms are one - way functions

    演演算是單向函數。
  6. Using hashing algorithms for data integrity and authentication

    演演算用於資料完整性和認證
  7. Many constructions for macs do not depend on cryptographic hashing

    Mac的許多構造不是取決於密碼雜湊法的。
  8. For a big bit hash, try using a symmetric cipher adapted to perform hashing

    對于大位數,嘗試使用適合於執行雜湊法的對稱加密術。
  9. Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms

    密碼函數可以用做老式校驗和演演算的隨便替代物。
  10. In this part, some new constructions are proposed which include serial parallel, parallel constructions, and different hash functions are mixed in one hash algorithm

    4 .目前的hash演算通常在數據壓縮方面採用的是串列迭代方式,不能進行并行計算。
  11. In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al

    Hash函數也稱函數或演算就是能夠把任意長度小於264比特的消息串m映射成某一固定長度的輸出串h的一種函數。
  12. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了函數機制后,我們利用j . seberry等人提出的方,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的輪函數,並利用這些輪函數,在原sha - 1函數的基礎上,設計出了新的演算csha 。
  13. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure

    本文重點研究了在電子公文的數字簽名問題,主要從演算和針對公文流轉的數字簽名協議,以及基於pki公鑰基礎設施的密鑰管理三個方面進行了討論,本文的主要工作包括: 1
  14. For a 64 - bit hash algorithm, she would select 33 places in each document

    對於64位元演演算,她將在每份文件中選擇33個地方。
  15. Most hashing algorithms that people use in practice are published and well - understood

    人們在實務中使用的大多數演演算是公開發布和為人熟知的。
  16. Neither sha - 1 nor the gost hash algorithm has intellectual property restrictions of any significance

    Sha - 1或gost演演算都沒有任何知識產權限制。
  17. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms

    大多數數位簽章系統將公鑰密碼學和密碼演演算結合使用。
  18. One good example is the gost hash algorithm, derived from the gost cipher, with a hash length of 256 bits

    Gost演演算是個好範例,它從gost加密術派生而來,帶有256位的長度。
  19. In this installment, they turn to common approaches to data integrity and authentication, starting with hashing algorithms

    在這一部分中,他們從介紹演演算開始,致力於研究用於資料完整性和認證的常用方
  20. If you publicly release a regular cryptographic hash for a document, anyone can verify the hash, assuming they know the hashing algorithm

    如果您公開發布一個文件的有規律密碼,則任何人都可以檢驗該,假設他們知道演演算的話。
分享友人