| 1. | Hash functions usually produce constant - sized digests 杂凑函数通常产生恒定大小的摘要。 |
| 2. | Hash functions will be adopted to ensure the integrity of data 系统同时会采用杂凑函数功能,以确保资料的完整性。 |
| 3. | Hash functions will be adopted to ensure the integrity of data 系统同时会采用杂凑函数功能,以确保资料的完整性。 |
| 4. | Also , two different messages cannot produce the same hash results 此外,两个不同的信息不会得出相同的杂凑函数。 |
| 5. | Sha - 1 , which gives a 160 - bit hash , is a good hash function to use Sha - 1提供160位杂凑,是一种可以使用的好杂凑函数。 |
| 6. | Hash functions will also be adopted to protect the integrity of data 系统同时会采用杂凑函数功能,以确保资料的完整性。 |
| 7. | Hash functions will also be adopted to protect the integrity of data 系统同时会采用杂凑函数功能,以确保资料的完整性。 |
| 8. | You can use hash functions to ensure data integrity , much like a traditional checksum 可以使用杂凑函数来确保资料完整性,这很像传统的校验和。 |
| 9. | The local router checks the response against its own calculation of the expected hash value 本地路由器对照自己计算期待杂凑函数的数值来检查回覆。 |
| 10. | Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms 密码杂凑函数可以用做老式校验和演算法的随便替代物。 |