| 1. | Select a hashing algorithm from the following list 请从下表中选择散列算法。 |
| 2. | First , the hashing algorithm is applied to the code they wish to distribute 首先,对所要分发的代码应用散列算法。 |
| 3. | If successful , the same hashing algorithm will be applied to the code 如果验证成功,则对该代码使用同样的散列算法。 |
| 4. | Hashing algorithms produce unique binary message digests based on the code they sign 根据要签名的代码,散列算法产生唯一的二进制消息摘要。 |
| 5. | The cost of applying the partitioning hash algorithm is proportional to the size of the partitioning key 应用分区散列算法的代价与分区键的规模成比例。 |
| 6. | Hash algorithms are techniques that computes a condensed representation of a message or data file . 散列算法是一种技术,用来计算信息或数据文件的压缩表示方法。 |
| 7. | The hashing algorithm is applied to the value of the partitioning key , and generates a partition number between zero and 4095 散列算法应用于分区键的值,产生0到4095之间的一个分区号。 |
| 8. | Trailing blanks in character strings char , varchar , graphic , or vargraphic are ignored by the hashing algorithm 字符串中( char 、 varchar graphic或vargraphic )的尾部空格会被散列算法忽略。 |
| 9. | Using the industry - accepted hash algorithm to protect the data integrity . and provided evidence of malice juggle occurred during the data transfer 3 )利用业界公认的散列算法取保数据完整性,并提供数据传送期间发生的恶意篡改的证据。 |
| 10. | The paper analyzes the one - way hash function ( sha - 1 ) and study the process of gaining keks from ak using sha - 1 . this paper discusses the state models of key management protocol in bpi + system and key usage 分析讨论了单向散列函数的安全散列算法( sha - 1 ) ,研究了ak进行必要的填充后使用sha - 1得到密钥加密密钥( kek )的过程。 |