• Select a hash algorithm from the following list.

    以下列表中选择一种散列算法

    youdao

  • Select a hash algorithm from the following list.

    列表选择一个注册的应用程序。

    youdao

  • This property is the key for the keyed hash algorithm.

    这个属性有金杂凑算法之金钥。

    youdao

  • The hash algorithm specifies the size of the hash code.

    算法指定哈希代码大小

    youdao

  • The integrity of the certificate is checked using the hash algorithm.

    证书完整性使用希算法校验的。

    youdao

  • Then, HASH algorithm is used to deal with redundant information.

    其次采用哈希算法进行冗余信息处理

    youdao

  • Creates an instance of the specified implementation of a hash algorithm.

    创建哈希算法指定实现实例

    youdao

  • As the name implies, the hash part USES a hash algorithm to store and find its keys.

    顾名思义部分散列算法存储查找

    youdao

  • When overridden in a derived class, gets an instance of the specified keyed hash algorithm.

    派生重写获取指定加密哈希算法的实例

    youdao

  • When overridden in a derived class, sets the hash algorithm to use for creating the signature.

    派生中重写时设置用于创建签名算法

    youdao

  • The cost of applying the partitioning hash algorithm is proportional to the size of the partitioning key.

    应用分区散列算法代价与分区键的规模成比例

    youdao

  • In rare cases, the hash algorithm may produce the same hash number for two different chunks of data.

    极少数情况下,哈算法可能会产生两种不同数据相同的哈希

    youdao

  • The hash algorithm and its improvement can be used in sorting data with some distributions much better.

    这种散列算法及其推广可以好地运用某些分布数据排序

    youdao

  • A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.

    用于检索安全哈希算法修订版掩码修订版更正了SHA中的一个发布的错误

    youdao

  • Traditional digital signature systems can only sign one single file, and they use single direction hash algorithm.

    传统电子签名体系主要针对单一数据文件,在对文件集入行保全时只能对单个文件逐个入行签名

    youdao

  • This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    介绍MD 5算法对它的安全性能分析,提出了基于MD5键控散列算法。

    youdao

  • The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).

    类型属性指出hash算法例如消息摘要算法5 (MD5)安全哈希算法(SHA - 1)。

    youdao

  • Computes the hash value of the specified input stream using the specified hash algorithm, and signs the resulting hash value.

    使用指定算法计算指定字节数组子集的哈希结果哈希值签名

    youdao

  • During binary loading, the te sub system is called by the system loader, which calculates the hash using the SHA-256 hash algorithm.

    二进制加载期间,系统加载程序调用te子系统使用SHA- 256算法计算散列值。

    youdao

  • Computes the hash value of a subset of the specified byte array using the specified hash algorithm, and signs the resulting hash value.

    使用指定算法计算指定字节数组子集哈希结果哈希值签名

    youdao

  • Combining the advantages of chaotic coupled system and conventional one-way hash algorithm, a new keyed one-way hash function was presented.

    结合混沌系统以及传统函数优点,提出一种新的带密钥单向散列函数的构造方法。

    youdao

  • Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.

    插件应用程序使用MD 5算法明文密码进行列计算,数据库中存储散列形式的密码。

    youdao

  • Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.

    生成一个新的公钥对吗?加密服务提供程序密钥长度散列算法设置都会保留

    youdao

  • The final chapter expounds on correction methods of random sequences, and proposes a method of using the hash algorithm to correct the original outputs of TRNG.

    本文最后分析了随机序列修正方法提出了哈希算法随机数发生器原始输出进行修正的方法

    youdao

  • Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.

    任何接收消息的人都可以消息使用相同散列算法然后使用公开密匙解密附带已加密摘要比较两者的值。

    youdao

  • At the same time, this paper has designed one kind of buffer pool structure to be allowed the quick look and traversal of alarm information using the Hash algorithm.

    同时本文采用哈希算法设计可以快速查找遍历告警信息缓冲结构

    youdao

  • Use of document storage systems such information, the use of tabs collision Hash algorithm, with the latest data cache memory to achieve efficient information retrieval.

    利用文件系统存储这些信息,利用Hash碰撞分页算法加上最新数据内存缓存实现高效的信息检索

    youdao

  • The padding is terminated by a "00" byte. It's followed by "30 21 30 09 06 05 2B 0E 03 02 1A 05 00 04 14" which is the PKCS #1 v2.1 way of specifying the SHA-1 hash algorithm.

    填充字节00结束,后面的是"3021 300906052B0E03021A 05 000414",PKCS #1v2.就是这样指定SHA-1哈希算法。

    youdao

  • The construction of a provable hash algorithm is developed based on the operations from various groups, also, a safety message authentication code is presented by the result.

    本文利用来自不同运算构造一种能证明其安全性杂凑算法应用已证明的结果构造安全的消息认证

    youdao

  • A hash is very much like a fingerprint and the hash algorithm is constructed so that the smallest change in the source produces a completely different and unpredictable hash value.

    非常类似于指纹通过构建哈希算法,即使中的最小更改也会产生完全不同不可预知的哈希

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定