查询词典 hash function
- 与 hash function 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The one-way coupled map lattices and initial condition generation function based on iterative Logistic map are used to realized the data confusion and diffusion between plain-text and key information. And the cipher block chaining mode is used to generate the 128-bit Hash value for plaint-text with arbitrary length.
该方法通过使用单向耦合映射格子和基于迭代Logistic映射的初始状态生成函数实现明文和密钥信息的混淆和扩散,并基于密码块连接方式产生任意长度明文的128位Hash值。
-
A poor choice of hash function may cased high probability of keys mapping to the same hash bucket.
而array在resize的时候,需要将原先的元素复制到一个新的空间中去。
-
At the end of this paper, we investigate the invertible problem with the watermarking algorithms, and analyze the situation of image ownership dispute caused by the possible counterfeit attack for the reason of invertibility. Then we discuss one method based on one-way hash function to make the watermarking algorithms non-invertible, and another one using the time stamping protocol, to prevent the counterfeit attacks.
本文随后研究了水印算法的可逆性问题,对于由此可能发生的伪造攻击致使对图象所有权产生争议的情况作了分析,并且讨论了基于单向Hash函数的使水印算法不可逆的方法,以及采用时间戳协议以阻止伪造攻击的方法。
-
The security verification based on the content authentication is implemented through feature extraction, choosing of the shared encryption key, transformation of the Hash function and generation of the Merkle tree, which is simulated in the environment of NS-2. The result shows that the proposed mechanism has better performance in the efficiency and security.
通过特征提取、选取共享密钥、Hash函数变换和构造Merkle树实现基于内容认证的安全性检验,并在NS-2环境下进行了仿真模拟,结果表明所提出的安全机制具有较好的效率和安全性。
-
The performance of this structure and the corresponding algorithm is studied.(6) The concept of hash function mapping uniformity ratio is proposed. With it, the mapping uniformity of modular based hash function is studied.
6就哈希映射的均衡性问题,提出了哈希映射均衡度的概念,并对基于取模运算的哈希映射均衡性进行了深入的研究。
-
At the encapsulation phase of the proposed scheme, no paring computing and no MapToPoint hash function are required.
提出的实例方案在会话密钥封装阶段不需要进行对计算以及映射到点的Hash函数计算。
-
In 2005, Di Xiao proposed an entire deniable protocol based on chaotic maps, which used chaotic model to a chaotic key exchange scheme and a chaotic hash function.
Di Xiao等人于2005年提出了一种基于混沌映射的可否认认证方案,该方案利用混沌模型分别构造了一个混沌****交换协议和公钥加密以及一个混沌Hash函数。
-
An Integer Wavelet Transform with parameters is firstly constructed and the transmutative Rijndael code is used to construct a Hash function, and then a visible digital watermark algorithm based on the Integer Wavelet Translation with parameters, Discrete Cosine Transform and the Transmutative Rijndael encryption algorithm are presented.
构造出了带参数的整数小波,应用变型的Rijndael密码构造出了Hash函数。提出了一种基于带参数整数小波变换、离散余弦变换及变型Rijndael加密算法的可见数字水印算法。
-
Hash A unary function object type that acts a hash function for a Key .
一元函数对象类型,用作 Key 的散列函数。
-
Hash A unary function object type that acts a hash function for a Key .
一元函数对像类型,用作 Key 的散列函数。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。