英语人>网络例句>hash 相关的网络例句
hash相关的网络例句
与 hash 相关的网络例句 [注:此内容来源于网络,仅供参考]

The one-way coupled map lattices and initial condition generation function based on iterative Logistic map are used to realized the data confusion and diffusion between plain-text and key information. And the cipher block chaining mode is used to generate the 128-bit Hash value for plaint-text with arbitrary length.

该方法通过使用单向耦合映射格子和基于迭代Logistic映射的初始状态生成函数实现明文和密钥信息的混淆和扩散,并基于密码块连接方式产生任意长度明文的128位Hash值。

A primary motivation for cryptographic hash functions is that they serve as compact representative images of input messages, which they can uniquely identify. For example, the MD5 hash code "72c067b50c90837c95186d019f686700" can be looked on as the "fingerprint" to represent this thesis title uniquely.

密码学杂凑函数也称Hash函数、哈希函数或单向散列函数,它可以将任意长度的消息压缩到固定长度的杂凑值。

Once the hash starts, it's no longer in your control.

一旦HASH开始,HASH就不是你能控制的范围内。

If successful, a pointer to the allocated hash table is returned, with the bit mask (which is used in the hash function) set in hashmask.

如果成功,就返回一个指向已分配hash表的指针。掩码位设置在hashmask中。

In order to enhance the Hash functionperformance, this article structure one kindbased on the AES HASH function, this HASH function has dispersed arow result the length is 256 bits, may the very good defenseexhaustion attack.

为了提高Hash函数性能,本文构造了一种基于AES的hash函数,该哈希函数散列结果的长度为256比特,可以很好的防御穷举攻击。

MD4 and f RIPEMD.and used the two of the fortieth power Hash operates under any initial value to give the collision of the SHA-0 This means that the algorithms of security authentication extensively applied currently in the electronic commerce,bank system,and slock system tumblingly breaks down,which is the field of Hash function analysis.

这意味着目前广泛应用于电子商务、银行系统、证卷系统的安全认证算法??Hash函数分析领域堡垒的轰然倒塌。面对严峻而残酷的现实,依赖于Hash算法的银证系统数据安全传输问题,也就成为人们不得不及时解决的实际问题。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

If a class denes mutable objects and implements a cmp or eq method, it should not implement hash, since the dictionary implementation requires that a key's hash value is immutable (if the object's hash value changes, it will be in the wrong hash bucket).

如果类定义的是可变对象并且实现了 cmp或 eq方法,它就不应该实现 hash,因为字典实现一个散列表的键值是不可变的(如果对象的散列值改变了,它会放在错误的散列表位置中)。

If a class cmp method it should not dene a hash operation either; if it denes does not dene a cmp or eq but not hash, its instances will not be usable as dictionary keys.

如果类没有定义 cmp方法,它也不应该定义 hash操作;如果类定义了 cmp或 eq但没有 hash,它的实例就不能作为散列表的键使用。

第1/31页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Re-Hash
Hash Pipe
EZ Wider With Hash
推荐网络例句

This is not an ordinary box, which is used as a background picture of the dialog box, very pretty.

详细说明:这可不是一个一般的对话框,它是用图片作为背景的对话框,非常好看。

Conceal me what I am,and be my aid for such disguise as haply shall become the form of my intent.

遮掩我的身份,帮助我,我的面具将成为我的目的。

Now, there is no effective methods for this disease, chemotheraphty and hemapoietic stem cell transplantion are often used, but complete remisson rate is not very high.

目前还没有良好的治疗方法,常采用化疗和造血干细胞移植的治疗手段,但完全缓解率并不高,而且在治疗过程中容易诱发肿瘤溶解综合征。