| 1. | What s a good hashing algorithm to use 什么是适用的好杂凑演算法呢? |
| 2. | Hashing algorithms are one - way functions 杂凑演算法是单向函数。 |
| 3. | Using hashing algorithms for data integrity and authentication 将杂凑演算法用于资料完整性和认证 |
| 4. | For a 64 - bit hash algorithm , she would select 33 places in each document 对于64位元杂凑演算法,她将在每份文件中选择33个地方。 |
| 5. | Most hashing algorithms that people use in practice are published and well - understood 人们在实务中使用的大多数杂凑演算法是公开发布和为人熟知的。 |
| 6. | Neither sha - 1 nor the gost hash algorithm has intellectual property restrictions of any significance Sha - 1或gost杂凑演算法都没有任何知识产权限制。 |
| 7. | Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms 大多数数位签章系统将公钥密码学和密码杂凑演算法结合使用。 |
| 8. | One good example is the gost hash algorithm , derived from the gost cipher , with a hash length of 256 bits Gost杂凑演算法是个好范例,它从gost加密术派生而来,带有256位的杂凑长度。 |
| 9. | In this installment , they turn to common approaches to data integrity and authentication , starting with hashing algorithms 在这一部分中,他们从介绍杂凑演算法开始,致力于研究用于资料完整性和认证的常用方法。 |
| 10. | If you publicly release a regular cryptographic hash for a document , anyone can verify the hash , assuming they know the hashing algorithm 如果您公开发布一个文件的有规律密码杂凑,则任何人都可以检验该杂凑,假设他们知道杂凑演算法的话。 |