英语人>网络例句>散列函数 相关的搜索结果
网络例句

散列函数

与 散列函数 相关的网络例句 [注:此内容来源于网络,仅供参考]

The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.

这次竞赛的目的是为了寻找一个强大的替代品,来取代现有的散列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要差的加密性。

Secondly, for the same hash function, the sample with the minimum hash value is selected as the global sample and the local samples are combined at the center node to filter out the biased effect of duplicated updates.

然后,对于相同散列函数产生的样本选取具有最小散列值的样本作为全局样本,完成局部样本集在中心节点的合并,滤除在分布节点上的重复更新对样本偏斜的影响。

The secret hash digital signature is a new siganture method that combines the ideas of RSA public-key algorithm, MD5 one-way hash function and permutation code at the same time.

保密散列数字签名算法利用RSA公钥密码体制的原理、MD5单向散列函数和排列码加密的思想,构造了一种能够快速实现数据保密、数字签名的签名方案。

A primary motivation for cryptographic hash functions is that they serve as compact representative images of input messages, which they can uniquely identify. For example, the MD5 hash code "72c067b50c90837c95186d019f686700" can be looked on as the "fingerprint" to represent this thesis title uniquely.

密码学杂凑函数也称Hash函数、哈希函数或单向散列函数,它可以将任意长度的消息压缩到固定长度的杂凑值。

Effects : Finds an iterator to the first element whose key is "key" according to the given hasher and equality functor or end if that element does not exist.

作用: 找到一个迭代器,指向按给定散列函数及相等性函数其键值为"key"的第一个元素,如果该元素不存在,返回 end。

The hash function is the very core of the fast lookup capabilities of the unordered sets: a hasher is just a Unary Function returning an std::size_t value for any given key.

散 列函数是无序集合的快速查找能力的核心:散列器就是一个可以对任意给定的键值返回一个 std::size_t 值的单参函数对象。

Search of Chinese characters; hashing; hash function; adaptive hashing

关键字]汉字查找;散列查找;散列函数;自适应散列查找

Constructors have optional extra parameters for the initial minimum number of buckets, a hash function and an equality object.

构造函数有可选的额外参数,用于初始化最小的桶数量、散列函数和等同性函数对象。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

第1/3页 1 2 3 > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。