hash algorithm中文,hash algorithm的意思,hash algorithm翻译及用法

2026-04-13 09:05 浏览次数 19

hash algorithm

英[hæʃ ˈælɡəriðəm]美[hæʃ ˈælɡəˌrɪðəm]

杂凑算法;散列算法;哈希算法

hash algorithm 片语

片语

hash iterative algorithm哈希迭代算法

Hash match algorithm哈希匹配算法

hash index algorithmHash索引算法

-page hash table algorithm双页表hash结构算法

hash encryption algorithmhash加密算法

Hash Partition Algorithm基于分区的散列算法

parallel hash join algorithm并行hashjoin算法

hash functionhash algorithm哈希算法

hash algorithm 例句

英汉例句

  • The hash algorithm and its improvement can be used in sorting data with some distributions much better.

    这种散列算法及其推广可以很好地运用于某些分布的数据排序。

  • The final chapter expounds on correction methods of random sequences, and proposes a method of using the hash algorithm to correct the original outputs of TRNG.

    本文最后分析了随机序列的修正方法,提出了用哈希算法对真随机数发生器的原始输出进行修正的方法。

  • Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.

    插件应用程序使用MD 5散列算法对明文密码进行散列计算,并在数据库中存储散列形式的密码。

  • When overridden in a derived class, sets the hash algorithm to use for creating the signature.

    当在派生类中重写时,设置用于创建签名的哈希算法。

  • This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。

  • Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.

    要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。

  • A hash is very much like a fingerprint and the hash algorithm is constructed so that the smallest change in the source produces a completely different and unpredictable hash value.

    哈希非常类似于指纹,通过构建哈希算法,即使是源中的最小更改也会产生完全不同和不可预知的哈希值。

  • In rare cases, the hash algorithm may produce the same hash number for two different chunks of data.

    在极少数情况下,哈希算法可能会产生了两种不同的数据块相同的哈希数。

  • As the name implies, the hash part USES a hash algorithm to store and find its keys.

    顾名思义,散列部分用散列算法存储及查找它的键。

  • Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.

    任何接收此消息的人都可以对该消息使用相同的散列算法,然后使用您的公开密匙解密附带的已加密摘要,并比较两者的值。

  • The construction of a provable hash algorithm is developed based on the operations from various groups, also, a safety message authentication code is presented by the result.

    本文利用来自不同群的运算,构造一种能证明其安全性的杂凑算法,并应用已证明的结果构造安全的消息认证码。

  • Select a hash algorithm from the following list.

    从以下列表中选择一种散列算法。

  • The hash algorithm specifies the size of the hash code.

    哈希算法指定哈希代码的大小。

相关热词