单词 | cryptographic hash | ||||||||||||
释义 | cryptographic hash
更多释义 收起释义 例句释义: 密码杂凑,密码散列,加密杂凑 1. When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature. 当处于“record”模式时,这些停顿时间将被扩展为字符串并用于生成签名的密码散列。 www.ibm.com 2. The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase. 然后,开发的签名将被转换为密码散列并存储到磁盘中,以供稍后在监视阶段中进行比较。 www.ibm.com 3. Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash. 先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。 www.ibm.com 4. Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support. 其他特性还包括加密散列函数,加密转换库和加密硬件支持。 www.ibm.com 5. Represents the base class from which all implementations of cryptographic hash algorithms must derive. 表示所有加密哈希算法实现均必须从中派生的基类。 msdn2.microsoft.com 6. Instead, a cryptographic hash of the passphrase is stored. 相反,储存了密码的密码杂凑。 www-128.ibm.com 7. For example, consider using a cryptographic hash to authenticate users logging into a machine from the console. 例如,考虑使用密码杂凑来认证从控制台登入到机器的使用者。 www-128.ibm.com 8. To do so, you would want to have a cryptographic hash or full-blown digital signature of the document. 为此,需要使用加密的散列值或者完善的文档数字签名。 www.ibm.com 9. The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm. 加密散列是使用SHA-256算法来计算的,数字签名是使用RSA算法来生成的。 www.ibm.com 10. HMAC can be used with any iterative cryptographic hash function, such as MD5 or SHA-1, in combination with a secret shared key. HMAC可以与任何反覆式的密码编译杂凑函式(例如MD5或SHA-1)一起使用,并与秘密共用金钥组合。 technet.microsoft.com 1. Generates and displays cryptographic hash over a file 通过文件生成并显示加密散列 angel.w15.5tom.cn |
||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。