单词 | hash function |
释义 | 例句释义: 散列函数,杂凑函数,哈希函数,杂凑函式 1. Try to use built-in primitives instead of building your own construction out of an encryption algorithm and a hash function. 尝试使用内置原语而不是抛开加密演算法和杂凑函数去建构自己的构造。 www-128.ibm.com 2. The function has no effect if an exception is thrown, unless it is thrown by the container's hash function or comparison function. 如果抛出异常,则该函数没有作用,除非异常是从容器的散列函数或比较函数中抛出的。 boost-doc-zh.googlecode.com 3. So every extra little bit of overhead in your hash function can be a bottleneck. 因此,散列函数中每一点多余的开销都可能成为瓶颈。 www-128.ibm.com 4. Session. Hash_function allows you to specify the hash algorithm used to generate the session IDs. session.hash_function允许用户指定生成会话ID的散列算法。 in.php.net 5. To store an object in an unordered associative container requires both an key equality function and a hash function. 要将一个对象保存在无序关联式容器中,需要有一个键值等同性函数和一个散列函数。 boost-doc-zh.googlecode.com 6. In open addressing, when a data item can't be placed at the index calculated by the hash function, another location in the array is sought. 在开放地址法中,若数据不能直接放在由哈希函数计算出来的数组下标所指的单元时,就要寻找数组的其他位置。 blog.sina.com.cn 7. A more well-behaved hash function would distribute the hash values more evenly across the hash range. 一个循规导矩(Well-behaved)的散列函数将在该散列范围内更均匀地分配散列值。 www.ibm.com 8. An array into which data is inserted using a hash function is called a hash table. 使用哈希函数向数组插入数据后,这个数组就称为哈希表。 blog.sina.com.cn 9. The root member of a team of connected hash operators sharing a common hash function and partitioning strategy. 拥有相同哈希函数和分区策略的相互连接的哈希运算符组的根成员。 www.dictall.com 10. The cryptographic strength of HMAC depends on the properties of the underlying hash function. HMAC的加密强度取决于基础哈希函数的属性。 msdn2.microsoft.com 1. Public key system, single direction Hash function, certificate authority organization and public key management are introduced. 本文介绍了公开密码加密体制、单向散列函数、认证机构和公钥管理等。 www.elecfans.com 2. As an important branch of Cryptography, Hash function is a one-way function and a kind of encryption map. 散列函数是密码学中一个重要的分支,它是一种单向函数,是一类加密映射,可以利用它来保护信息。 www.fabiao.net 3. If that was the case, then the hash function could never reliably store or retrieve the associated value. 如果这样的情况发生,哈希函数就不可能可靠地存储或获取相关的数据。 dictsearch.appspot.com 4. The assignment operator. Copies the contained elements, hash function, predicate and maximum load factor but not the allocator. 赋值操作符。复制所含的元素、散列函数、谓词、最大负载因子,但不复制分配器。 boost-doc-zh.googlecode.com 5. The copy constructor. Copies the contained elements, hash function, predicate, maximum load factor and allocator. 复制构造函数。复制所含的元素、散列函数、谓词、最大负载因子和分配器。 boost-doc-zh.googlecode.com 6. A keyed hash algorithm is a key-dependent, one-way hash function used as a message authentication code . 带密钥的哈希算法是一种用作消息身份验证代码的、依赖密钥的单向哈希函数。 www.showxiu.com 7. To avoid this a transformation could be applied to the hash function, for an example see Thomas Wang's article on integer hash functions. 为了避免这个问题,可以对散列函数进行一个转换,有关例子请见ThomasWang关于整数散列函数的论文。 boost-doc-zh.googlecode.com 8. To use a public-key system to digitally sign a message, the sender first applies a hash function to the message to create a message digest. 若要使用公钥系统对消息进行数字签名,发送方先向该消息应用哈希函数以创建消息摘要。 msdn2.microsoft.com 9. Combining the advantages of chaotic coupled system and conventional one-way hash algorithm, a new keyed one-way hash function was presented. 结合双混沌系统以及传统散列函数的优点,提出一种新的带密钥单向散列函数的构造方法。 www.joca.cn 10. Each bucket is associated with a hash code, generated using a hash function and based on the key of the element. 每一存储桶都与一个哈希代码关联,该哈希代码是使用哈希函数生成的并基于该元素的键。 msdn2.microsoft.com 1. The Hash Match Root operator and all Hash Match Team operators directly below it share a common hash function and partitioning strategy. HashMatchRoot运算符与其下一级所有HashMatchTeam运算符共享同一个哈希函数和分区策略。 technet.microsoft.com 2. Clearly, for this process to work, the sender and receiver must agree on the hash function that will be used before transmission begins. 显然,要让这个过程生效,发送方和接收方必须在传送开始前就即将使用的散列函数达成一致。 www.ibm.com 3. Using a prime number of buckets, and choosing a bucket by using the modulus of the hash function's result will usually give a good result. 使用素数个桶,并且通过对散列函数的结果取模来选择桶通常有不错的结果。 boost-doc-zh.googlecode.com 4. The number of buckets is typically much smaller than the domain of input values for the hash function. bucket的数量通常比hash函数的输入值的范围小得多。 www.ibm.com 5. Serves as a hash function for a particular type. 用作特定类型的哈希函数。 msdn2.microsoft.com 6. Another property of a good hash function is that the output will not reflect the input in any discernable way. 好的杂凑函数的另一个特性是输出不以任何可辨认的方式反应输入。 www-128.ibm.com 7. This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. 提出了一种运用哈希函数进行MPEG-4内容认证的半脆弱可逆视频水印算法。 cjig.cn 8. Making use of digital signature, the original image is transformed by Hash function and is encrypted by their private key. 借助数字签名的思想,对原始图像进行哈希变换,并用私钥对其加密。 www.ceps.com.tw 9. Each hash function can produce collisions; in other words, two different input values can have the same hash code H(x). 每个hash函数可能产生冲突;换句话说,两个不同的输入值可能具有相同的hash码H(x)。 www.ibm.com 10. The SSL Server responds with the encryption algorithm and hash function to be used. SSL服务器用加密算法以及要使用的散列函数来表示响应。 www.ibm.com 1. The one-way hash function, diffusion and confusion and collision of the algorithm are studied by simulation. 理论分析和仿真试验证明该算法可以满足散列函数的各项性能要求。 www.fabiao.net 2. Using the hash function, each row is put in a bucket with other rows that have the same hash value. 通过哈希函数,将具有相同哈希值的行放在一个bucket中。 www.ibm.com 3. Hash A unary function object type that acts a hash function for a Value. 一元函数对象类型,用作Value的散列函数。 boost-doc-zh.googlecode.com 4. The receiver then invokes the same hash function on the received message and compares the generated digest to the one received. 接着,接收方对接收到的消息调用同一个散列函数,并将生成的摘要与接收到的摘要进行比较。 www.ibm.com 5. With the help of hash function, this protocol achieves identify anonymity and hop control. 利用哈希链性质实现了节点身份的匿名和跳数控制。 202.14.238.38 6. The hash function that van Lunteren devised for routing became essential for IBM's stream processor. 范卢特伦为路由设计的杂凑函数,遂成为IBM串流处理器的要件。 192.192.169.81 7. The "rolling" hash function is adopted to compute hash values of the substring. 定义“滚动”的散列函数把子串映射成相应的散列值; www.fabiao.net 8. Hash A unary function object type that acts a hash function for a Key. 一元函数对象类型,用作Key的散列函数。 boost-doc-zh.googlecode.com 9. Supplies a hash code for an object, using a custom hash function. 使用自定义哈希函数为对象提供哈希代码。 msdn2.microsoft.com 10. If you wish to use a different equality function, you will also need to use a matching hash function. 如果你希望使用一个不同的等同性谓词,你也需要使用一个相匹配的散列函数。 boost-doc-zh.googlecode.com 1. Then, for each probe row (as applicable), it computes a hash value (using the same hash function) and looks in the hash table for matches. 然后,该谓词为每个探测行(如果适用)计算哈希值(使用相同的哈希函数)并在哈希表内查找匹配项。 technet.microsoft.com 2. Sn. Exe computes the token using a hash function from the public key. Sn.exe使用公钥中的哈希函数计算该标记。 msdn2.microsoft.com 3. Serves as a hash function for this object. 作为此对象的哈希函数。 msdn2.microsoft.com 4. A hash function must always return the same hash code for the same key. 哈希函数必须始终为相同的键返回相同的哈希代码。 msdn2.microsoft.com 5. Serves as a hash function for the current BitVector32. Section, suitable for hashing algorithms and data structures, such as a hash table. 用作当前BitVector32.Section的哈希函数,适合用在哈希算法和数据结构(如哈希表)中。 msdn2.microsoft.com 6. The message digest (also called the message authentication code) is computed using a hash function. 消息摘要(又称消息认证代码)是用散列函数计算的。 www.ibm.com 7. Memcached similarly uses a hash function. Memcached也使用了类似的哈希函数。 www.bing.com 8. It is important that both the signer and the verifier use the same hash function to digest the data. 签名人和验证人必须使用相同的哈希函数对数据进行摘要。 msdn2.microsoft.com 9. The key of authentication is the use of a message authentication code (MAC), which is based on using a hash function. 采用以散列函数为基础的消息验证编码是其中的一种重要方法。 epub.cnki.net 10. Computes a Hash-based Message Authentication Code (HMAC) using the SHA512 hash function. 使用SHA512哈希函数计算基于哈希值的消息验证代码(HMAC)。 msdn2.microsoft.com 1. Half of the input is sent to each hash function. 对每个哈希函数发送一半的输入。 www.infoq.com 2. Given a good hash function that uniformly spreads data along the table, the look-up time is constant. 有了一个好的哈希函数,搜索每一个数据的时候都将是固定的。 www.bing.com 3. HMAC can be used with any iterative cryptographic hash function, such as MD5 or SHA-1, in combination with a secret shared key. HMAC可以与任何反覆式的密码编译杂凑函式(例如MD5或SHA-1)一起使用,并与秘密共用金钥组合。 technet.microsoft.com 4. For each element, a hash function calculates a number, which is used as an index into the table. 对每一个数据,哈希函数计算出一个数值用以作为该表的索引。 www.bing.com 5. A remote password authentication scheme based on one way hash function was proposed. 以混沌映射为基础,已有文献提出了一些构造单向散列函数的方法。 www.dictall.com 6. Study of Relation Between the Partial Balance of Compression Function and the Balance of Hash Function 压缩函数局部平衡度与Hash函数平衡度的关系研究 www.ilib.cn 7. Chaotic-maps-based Hash function and its application in identity certification 基于混沌映射的Hash函数及其在身份认证中的应用 www.ilib.cn 8. Triple-Block-Chaining-Based Hash Function and Its Performance Analysis 基于三重分组链接的散列函数及其性能分析 www.ilib.cn 9. Design and analysis of a wireless authentication protocol against DoS attacks based on Hash function 基于Hash函数的抗攻击无线认证方案 ilib.cn 10. Automatic, hash-function based data partitioning and distribution 支持自动地基于hash函数的数据分片策略 news.cnblogs.com 1. Provable Security to One Kind of Hash Function Constructed by Block Cipher's CMAC Mode 分组密码算法链接模式构造单向函数的可证安全性 www.ilib.cn 2. The hash function used to generate the message digest 用于生成消息摘要的散列函数 www.ibm.com 3. Arithmetic of utilizing neural network simulating Hash function 一种应用神经网络模拟Hash函数的算法 www.ilib.cn 4. Unilateral Hash Function Applied in Software Media Management 单向哈希函数在软件媒体管理中的应用 service.ilib.cn 5. Improving Fragileness of Semi-fragile Digital Watermarking by Using Hash Function 应用Hash函数增强数字图像半易损性水印的易损性 www.ilib.cn 6. Design and realization of hash function-based stroke sequencing system of Chinese characters 基于内码替换的汉字笔划排序系统的设计与实现 www.ilib.cn 7. Application of chameleon hash function to proxy signature scheme 变色龙散列函数在代理签名方案中的应用 www.ilib.cn 8. A hash function gives the primary index of a key; 散列函数给出键的主索引; blog.chinaunix.net 9. The construction of a new Hash function 一种新的哈希函数的构造 www.ilib.cn 10. Research on the Fair Exchange Protocol Using Hash Function Chains 利用Hash函数链的公平交易协议研究 www.ilib.com.cn 1. A Dynamic IP Routing Lookup Algorithm Based on Limited Prefix Expansion and Multiple Hash Function Techniques 基于有限前缀扩展和多Hash函数的动态IP路由查找算法 scholar.ilib.cn 2. Application of Hash Function in Digital Signature Hash函数在数字签名中的应用 www.ilib.cn 3. Study of mapping uniformity of modular based on Hash function 基于取模运算哈希函数映射均衡性研究 www.ilib.cn 4. Keyed Hash function based on composite nonlinear autoregressive filter 基于复合非线性数字滤波器的Hash函数构造 www.ilib.cn 5. A Fast Computational Hash Function in Binary Fields 一种二元域上的快速计算哈希函数 www.ilib.cn 6. One-way Hash function construction based on tangent-delay ellipse reflecting cavity-map system 基于切延迟椭圆反射腔映射系统的单向Hash函数构造 www.ilib.cn 7. Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps 基于耦合帐篷映射的时空混沌单向Hash函数构造 www.ilib.cn 8. Image encryption algorithm based on continuous chaotic system and Hash function 基于连续混沌系统和Hash函数的图像加密算法 www.ilib.cn 9. Secure Application of Hash Function in E-Commerce Hash杂凑函数在电子商务中的安全应用 www.ilib.cn 10. New On-Line Secret Sharing Scheme Using Hash Function 利用杂凑函数的在线秘密分享机制 www.ilib.cn 1. One-way Hash function construction based on two-dimensional hyper-chaotic mappings 基于二维超混沌映射的单向Hash函数构造 www.ilib.cn 2. Improved algorithm of dynamic secret sharing schemes based on Hash function 基于Hash函数的动态密钥分存技术的改进 ilib.cn 3. One way Hash function construction based on Spatiotemporal chaos 基于时空混沌系统的单向Hash函数构造 www.ilib.cn 4. One way Hash function construction based on the extended chaotic maps switch 基于广义混沌映射切换的单向Hash函数构造 www.ilib.cn 5. A New User-computer Combination Authentication Based on Hash Function 一种基于单向散列函数的人机结合认证系统 service.ilib.cn 6. Security research of secret sharing schemes based on Hash function 基于Hash函数的秘密共享方案安全研究 www.ilib.cn 7. Design of Chaotic Hash Function Based on Nonlinear Digital Filter 基于非线性数字滤波器的混沌Hash函数设计 www.ilib.cn 8. One way Hash function construction based on chaotic mappings 基于混沌映射的单向Hash函数构造 www.ilib.cn 9. Design keyed Hash function based on couple chaotic system 基于双混沌系统的带秘密密钥散列函数构造 www.ilib.cn 10. One-way Hash function based on chaotic neural network 基于混沌神经网络的单向Hash函数 www.ilib.cn 1. A method of authentication based on hash function 基于单向散列函数的双向身份鉴别 ilib.cn 2. Security research on dynamic password authentication protocols based on one-way Hash function 一类动态密码认证协议的安全研究 www.ilib.cn 3. User Authentication Scheme Using Smart Cards Based on One-Way Hash Function 基于单向散列函数的智能卡鉴别方案 www.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。