查询词典 hash function
- 与 hash function 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
We use symmetrical cryptography, bilinear mapping, hash function, identity-based encryption as basic knowledge tools.
在本文的研究工作中,用到了分组密码、双线性映射、单向散列函数、基于身份的加密等知识工具。
-
In addition, algorithms used in PBE were discussed in details, including International Data Encryption Algorithm, Advanced Encryption Standard of U.S., safe Hash function named SHA-1, Pseudo Random Number Generator.The modes of operation in blok cipher,such as Electronic Code Book, Cipher Block Chaining, Cipfertext Feedback and Output Feedback,are described in the thesis.
采用DSP TMS320C5409汇编语言编制了以上各种算法,在DSP上实现了一个口令加密系统,数据加密速度达到3Mb/s以上,并实现密钥的安全管理,能满足个人PC机脱离主CPU加密大量数据的需要。
-
A hash function based on triple-block chaining is put forward and its security is demonstrated.
提出了一类基于三重分组链接的单向散列函数,并论证了其安全性。
-
In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.
本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。
-
This paper proposes one new electronic seal scheme, and designs and implements aelectronic seal system based on SHA-1 Hash function, the Elliptic Curve DigitalSignature Algorithm, and watermarking algorithm based on quadratic residue.
论文主要提出了一种新的电子签章方案,设计实现了一个电子签章系统。
-
Secondly, for the same hash function, the sample with the minimum hash value is selected as the global sample and the local samples are combined at the center node to filter out the biased effect of duplicated updates.
然后,对于相同散列函数产生的样本选取具有最小散列值的样本作为全局样本,完成局部样本集在中心节点的合并,滤除在分布节点上的重复更新对样本偏斜的影响。
-
A hash function must always return the same hash code for the same key.
哈希函数必须始终为相同的键返回相同的哈希代码。
-
The secret hash digital signature is a new siganture method that combines the ideas of RSA public-key algorithm, MD5 one-way hash function and permutation code at the same time.
保密散列数字签名算法利用RSA公钥密码体制的原理、MD5单向散列函数和排列码加密的思想,构造了一种能够快速实现数据保密、数字签名的签名方案。
-
The hash function is the very core of the fast lookup capabilities of the unordered sets: a hasher is just a Unary Function returning an std::size_t value for any given key.
散 列函数是无序集合的快速查找能力的核心:散列器就是一个可以对任意给定的键值返回一个 std::size_t 值的单参函数对象。
-
Because the implanted hash function of HMAC is implemented as an individual function block, this block could be replaced easily according to the security request. The high capability of withstanding attacks of HMAC-ECDSA algorithm is proved by using modular arithmetic.
从密码学理论分析,HMAC可以使用密钥且HMAC算法的验证只在当时有效;在程序设计中实现HMAC时,可以将嵌入的哈希算法作为一个独立的模块,根据安全强度的需求替换哈希算法模块;在对攻击高抵抗性的证明中,利用模运算对HMAC-ECDSA算法的安全强度进行了验证。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。