您要查找的是不是:
- A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA. 用于检索“安全哈希算法”修订版的掩码,该修订版更正了SHA中的一个未发布的错误。
- A secure hash algorithm is designed so that it is computationally infeasible to construct a different assembly with the identical hash value by either an accidental or malicious attempt. 安全哈希算法的设计使以相同的哈希值构造不同的程序集在计算方面是不能实现的,不管这种尝试是意外的还是恶意的。
- SHA (secure Hash algorithm) algorithm 安全散列算法
- The strong data encryption is done by the 256 bit BLOWFISH block cipher (one of the most secure and fastest encryption algorithm) and SHA1 secure hashing algorithm. 存储数据的密码采用256位BLOWFISH密码(一种最安全,最快速的密码算法)和SHA1安全算法。
- security Hash algorithm 安全Hash算法SHA-1
- You must specify a hash algorithm. 您必须指定散列算法。
- Validating key set and hash algorithm. 正在验证密钥集和散列算法。
- Loads an assembly given its file name or path, security evidence hash value, and hash algorithm. 通过给定程序集文件名或路径、安全证据哈希值及哈希算法来加载程序集。
- Secure Hash Algorithm of improving reliability for railway information transmission among block 提高铁路区间信息传输可靠性的安全散列算法
- This paper introduces the MD5 algorithm and security analysis.A new keyed hash algorithm based on MD5 is proposed. 介绍了MD5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
- And the Secure Hashing Algorithm (SHA) 以及安全散列算法(SHA)
- The hash algorithm specifies the size of the hash code. 哈希算法指定哈希代码的大小。
- This property is the key for the keyed hash algorithm. 此属性是键控哈希算法的密钥。
- It also imports a new safe Hash algorithm in this scheme. 在该方案中还引用了一种新的安全哈希算法。
- Gets or sets the hash algorithm to use for the membership condition. 获取或设置用于成员条件的哈希算法。
- You cannot edit the CTL because the system cannot recognize the hash algorithm. 由于系统无法识别散列算法,您无法编辑CTL。
- A hash algorithm is a mathematical formula used to create the file signature. 散列算法是用来创建文件签名的数学公式。
- secure hash algorithm 安全散列算法
- The padding mode used in the hashing algorithm. 哈希算法中使用的填充模式。
- N.B. of Standards. Secure hash standard. Technical Report FIPS Publication 180, National Bureau of Standards, 1993. 卢少峰.;网络安全审计系统的设计与实现