英语人>网络例句>hash code 相关的网络例句
hash code相关的网络例句

查询词典 hash code

与 hash code 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.

本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。

Based on the C language implementation of the hash table algorithm code, a good understanding of the hash table and its time complexity measure.

详细说明:基于C语言编写的哈希表算法的实现代码,可以很好的理解哈希表及其时间复杂度的度量。

In addition to the BYTE arrays for the hash, a hash object and code to perform the hashing was added.

除了为散,哈希对象和字节数组的代码来执行散列加入。

Changing the title, even by a single letter, will change most of the digits in the hash code.

杂凑值也被称为杂凑码、杂凑结果、消息摘要或数字指纹。

GetHashCode computes the hash code by using each name/value pair, thus, if two objects of a compiler generated class have exactly the same value for each name/value pair, the GetHasCode method would return the same value.

通过计算的GetHashCode每个名称/值对的哈希码,因此,如果两个对象的编译器生成的类,恰恰是每个名称/值对相同的值,GetHasCode方法将返回相同的值。

Returns the hash code.

返回的哈希代码。

The secret hash digital signature is a new siganture method that combines the ideas of RSA public-key algorithm, MD5 one-way hash function and permutation code at the same time.

保密散列数字签名算法利用RSA公钥密码体制的原理、MD5单向散列函数和排列码加密的思想,构造了一种能够快速实现数据保密、数字签名的签名方案。

The position of first word hash table is the hash character within an internal code of word in computer, and the other characters can be found along the pointer; segmentation algorithm is based on the structural design of the index tree to query string with matching characters along a pointer chain.

首字散列表由汉字内码哈希得到首字的位置,沿着指针可查询其他字;分词算法是根据索引树的结构设计的搜索查询算法,沿着指针链搜索匹配字符。

Software Description: Iside enables you to compare files and folders based on their hash code (MD5, SHA1, CRC32,...).

Iside 这个程序通过计算他们的杂乱信号来比较文件和文件夹代码。

Each words in the alphabet will be assigned an invertible hash-code.

字母表中的每一个字将被分配一个可逆的哈希代码。

第3/4页 首页 < 1 2 3 4 > 尾页
推荐网络例句

Chrysanthemum of 10 thousand birthday is lax to edaphic requirement, with the arenaceous qualitative loam with fecund, good drainage had better.

万寿菊对土壤要求不严,以肥沃。排水良好的砂质壤土为好。

He unstepped the mast and furled the sail and tied it.

他拔下桅杆,把帆卷起,系住。

Therefore, positively advances the interest rate marketability reform is one of current our country finance reform important tasks.

因此,积极推进利率市场化改革是当前我国金融改革的重要任务之一。