Select a hash algorithm from the following list.
从以下列表中选择一种散列算法。
Select a hash algorithm from the following list.
请从列表选择一个已注册的应用程序。
This property is the key for the keyed hash algorithm.
这个属性是有金钥的杂凑演算法之金钥。
The hash algorithm specifies the size of the hash code.
哈希算法指定哈希代码的大小。
The integrity of the certificate is checked using the hash algorithm.
证书的完整性是使用哈希算法校验的。
Then, HASH algorithm is used to deal with redundant information.
其次,采用哈希算法进行冗余信息的处理。
Creates an instance of the specified implementation of a hash algorithm.
创建哈希算法的指定实现的实例。
As the name implies, the hash part USES a hash algorithm to store and find its keys.
顾名思义,散列部分用散列算法存储及查找它的键。
When overridden in a derived class, gets an instance of the specified keyed hash algorithm.
在派生类中重写时,获取指定的加密哈希算法的实例。
When overridden in a derived class, sets the hash algorithm to use for creating the signature.
当在派生类中重写时,设置用于创建签名的哈希算法。
The cost of applying the partitioning hash algorithm is proportional to the size of the partitioning key.
应用分区散列算法的代价与分区键的规模成比例。
In rare cases, the hash algorithm may produce the same hash number for two different chunks of data.
在极少数情况下,哈希算法可能会产生了两种不同的数据块相同的哈希数。
The hash algorithm and its improvement can be used in sorting data with some distributions much better.
这种散列算法及其推广可以很好地运用于某些分布的数据排序。
A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.
用于检索“安全哈希算法”修订版的掩码,该修订版更正了SHA中的一个未发布的错误。
Traditional digital signature systems can only sign one single file, and they use single direction hash algorithm.
传统电子签名体系主要针对单一数据文件,在对文件集入行保全时只能对单个文件逐个入行签名。
This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.
介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。
Computes the hash value of the specified input stream using the specified hash algorithm, and signs the resulting hash value.
使用指定的哈希算法计算指定字节数组子集的哈希值,并对结果哈希值签名。
During binary loading, the te sub system is called by the system loader, which calculates the hash using the SHA-256 hash algorithm.
在二进制加载期间,系统加载程序调用te子系统,并使用SHA- 256散列算法来计算散列值。
Computes the hash value of a subset of the specified byte array using the specified hash algorithm, and signs the resulting hash value.
使用指定的哈希算法计算指定字节数组子集的哈希值,并对结果哈希值签名。
Combining the advantages of chaotic coupled system and conventional one-way hash algorithm, a new keyed one-way hash function was presented.
结合双混沌系统以及传统散列函数的优点,提出一种新的带密钥单向散列函数的构造方法。
Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.
插件应用程序使用MD 5散列算法对明文密码进行散列计算,并在数据库中存储散列形式的密码。
Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.
要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。
The final chapter expounds on correction methods of random sequences, and proposes a method of using the hash algorithm to correct the original outputs of TRNG.
本文最后分析了随机序列的修正方法,提出了用哈希算法对真随机数发生器的原始输出进行修正的方法。
Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.
任何接收此消息的人都可以对该消息使用相同的散列算法,然后使用您的公开密匙解密附带的已加密摘要,并比较两者的值。
At the same time, this paper has designed one kind of buffer pool structure to be allowed the quick look and traversal of alarm information using the Hash algorithm.
同时,本文采用哈希算法设计了一种可以快速查找和遍历告警信息的缓冲池结构。
Use of document storage systems such information, the use of tabs collision Hash algorithm, with the latest data cache memory to achieve efficient information retrieval.
利用文件系统存储这些信息,利用Hash碰撞分页算法,加上最新数据的内存缓存,实现高效的信息检索。
The padding is terminated by a "00" byte. It's followed by "30 21 30 09 06 05 2B 0E 03 02 1A 05 00 04 14" which is the PKCS #1 v2.1 way of specifying the SHA-1 hash algorithm.
填充字节以“00”结束,后面跟的是"3021 300906052B0E03021A 05 000414",PKCS #1v2.就是这样来指定SHA-1哈希算法。
The construction of a provable hash algorithm is developed based on the operations from various groups, also, a safety message authentication code is presented by the result.
本文利用来自不同群的运算,构造一种能证明其安全性的杂凑算法,并应用已证明的结果构造安全的消息认证码。
A hash is very much like a fingerprint and the hash algorithm is constructed so that the smallest change in the source produces a completely different and unpredictable hash value.
哈希非常类似于指纹,通过构建哈希算法,即使是源中的最小更改也会产生完全不同和不可预知的哈希值。
应用推荐