×

secure hash algorithm meaning in Chinese

安全保密扰乱算法
安全散列算法

Examples

  1. Sha - 1 public key cryptography for the financial services industry - part 2 : the secure hash algorithm
    金融服务业用公共密钥加密.第2部分:安全散列算式
  2. The credential pairs in the example are encrypted using the secure hash algorithm - 1 sha1 password - hashing format
    该示例中的凭据对是使用安全哈希算法1 ( sha1 )密码哈希格式加密的。需要
  3. A mask used to retrieve a revision of the secure hash algorithm that corrects an unpublished flaw in sha
    用于检索“安全哈希算法”修订版的掩码,该修订版更正了sha中的一个未发布的错误。
  4. A secure hash algorithm is designed so that it is computationally infeasible to construct a different assembly with the identical hash value by either an accidental or malicious attempt
    安全哈希算法的设计使以相同的哈希值构造不同的程序集在计算方面是不能实现的,不管这种尝试是意外的还是恶意的。

Related Words

  1. hashing routine
  2. secure
  3. secured debenture
  4. secure protocol
  5. secured financing
  6. securing clip
  7. securing rod
  8. secure traffic
  9. container securing
  10. secure future
  11. secure hand
  12. secure hash
  13. secure hash algorithm (sha)
  14. secure http
PC Version

Copyright © 2018 WordTech Co.