Translation of "cryptographic hash" to Chinese language:
Dictionary English-Chinese
Examples (External sources, not reviewed)
Hash, hash! Stew, stew! | 剩下的 剩下的 炯煮 |
Hash | 哈希 |
Hash | 哈希 |
Hash | Hash |
hash | Hash |
Hash | 哈希方式 |
Calculates the sha1 hash of filename using the US Secure Hash Algorithm 1, and returns that hash. | Description |
Software token for cryptographic authentication | 用于密码学认证的软件令牌 |
Password hash | 密码散列 |
Hash type | 哈希类型 hash as a hash of type md5, sha1 etc. |
Hash. Phooey. | 散开 阿福 |
File and hash | 文件名称 |
Hash, you marmalade! | 闭嘴 你们这些笨蛋 |
(a) whether the transformation was operated using the private cryptographic key that corresponds to the originator apos s public cryptographic key and | (a) 该转变是否是使用与发端人私人编密钥匙一致的私人编密钥匙操作的 和 |
LDAP Password hash method | LDAP 密码散列方式 |
Enter a hash key | 输入哈希键 |
Hash, stew, marmalade, submarines. | 杂烩菜 炖肉 果酱 潜艇三明治 |
(e) the user apos s public cryptographic key | (e) 用户的公用编密钥匙 |
Copy to Clipboard as Hash | 以 Hash 的形式复制到剪贴板 |
Certificate import hash successful created. | 证书已成功导入 |
The indices of the hash are | Returns a hash of strings with information about the current process CPU usage. The indices of the hash are |
The indices of the hash are | Description |
Certificate import hash could not created. | 证书导入失败 |
You're working as a hash slinger? | 你现在是个服务员 |
Calculating the hash and subscribing a user | 瞰赽 1. Calculating the hash and subscribing a user |
The hash is a 32 character hexadecimal number. | Calculates the MD5 hash of str using the RSA Data Security, Inc. MD5 Message Digest Algorithm, and returns that hash. The hash is a 32 character hexadecimal number. |
The hash is a 40 character hexadecimal number. | Calculates the sha1 hash of str using the US Secure Hash Algorithm 1, and returns that hash. The hash is a 40 character hexadecimal number. |
Use specified hash algorithm for IKE phase 1 | vpnc connect 路径 |
A hash of the certificate used to identify it quickly. | 用于快速证明证书有效性的散列值 |
There is a hash tag there that you can use, CBDQ. | 你可以用 CBDG这个hash tag |
This'll sound like hash. I better put some chords in for transition. | 这样听起来会很乱我最好为转场加点和弦 |
All these functions provide a handy abstraction to Zend 's internal hash API. | Adds a zval to the array. Useful for adding other arrays, objects, streams, etc... |
Fresh meat for the officers and hash for the men. That's his notion. | 新鲜肉给官员吃 剩下的给我们 他就是这么做的 |
Why, these people will make cold hash out of you in a week. | 为啥啊 这些人这周只会给你做冷蔬菜沙拉 |
(3) Authorized certification authorities may issue certificates in relation to the cryptographic keys of natural and legal persons. | quot (3) 经授权的验证局可以签发关于自然人和法人的编密钥匙的证书 |
(1) Natural and legal persons may equally obtain certification of cryptographic public keys used exclusively for identification purposes. | quot (1) 自然人和法人同样可以获得专用于识别目的的编密公用钥匙证 书 |
Zend features a single API for these types they 're stored using hash tables. | Complex types such as arrays and objects require different treatment. Zend features a single API for these types they're stored using hash tables. |
He choked on a pile of hash that was their answer He's a criminal. | 他是被一团大麻噎死的 这就是他们的回答 他是个罪犯 |
Phase 1 negotiation of IPSec connection has failed. Please check encryption and hash algorithm. | 身份鉴别失败 |
Phase 2 negotiation of IPSec connection has failed. Please check encryption and hash algorithm. | 身份鉴别失败 |
Of course. Why should I go on slinging hash when I can sling other things? | 当然是真的 如果有别的事做为什么还要干女招待 |
This entry points to the variable 's hash table entry if the variable is an array. | This entry points to the variable's hash table entry if the variable is an array. |
Phase 1 negotiation of IPSec connection has failed. Please check encryption of phase 1 and hash algorithm. | 身份鉴别失败 |
Listen, you little hash slinger, don't give me any of that lady stuff, or I'll bite you. | 幸会 听着, 你这个小服务员, 别露出本来面目, 不然我咬你 |
(1) A digital signature is a numerical value, which is affixed to a data message and which, using a known mathematical procedure associated with the originator apos s private cryptographic key, makes it possible to determine uniquely that this numerical value has been obtained with the originator apos s private cryptographic key. | quot (1) 数字签字为一数值 附在数据电文上 而且使用同发端人私人编密钥匙有联系的一个已知数学步骤 使得可能唯一地断定这一数值是靠发端人的私人编密钥匙获得的 |
Related searches : Cryptographic Hash Functions - Cryptographic Key - Cryptographic Primitives - Cryptographic Algorithms - Cryptographic Library - Cryptographic Controls - Cryptographic Software - Cryptographic Module - Cryptographic Operations - Cryptographic Strength - Cryptographic Security - Cryptographic Methods