Examples of using Cryptographic hash in English and their translations into Russian
{-}
-
Official
-
Colloquial
Cryptographic Hash Function.
Lamport one-time signatures are based on cryptographic hash functions.
HAVAL is a cryptographic hash function.
The rebound attack is a tool in the cryptanalysis of cryptographic hash functions.
The SHA-1 cryptographic hash algorithm or the CBC mode in SSH.
The technique may also be used to find a collision in a cryptographic hash function.
For this purpose, cryptographic hash functions are employed often.
The PMK is derived from a password that is put through PBKDF2-SHA1 as the cryptographic hash function.
There are a number of cryptographic hash functions that are fast to compute, such as SHA 256.
When the file hash condition is chosen,the system computes a cryptographic hash of the identified file.
Here md5 is cryptographic hash function, data- encoded parameters, password- your project password.
Fingerprints are created by applying a cryptographic hash function to a public key.
One-way compression functions are for instance used in the Merkle-Damgård construction inside cryptographic hash functions.
Installed packages are identified by a cryptographic hash of all input used for their build.
A password hash is a fixed-length value created by sending the password through a cryptographic hash function.
Alice has a 256-bit cryptographic hash function and some kind of secure random number generator.
A hash chain is the successive application of a cryptographic hash function to a piece of data.
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
The data produced in the previous step is hashed with a cryptographic hash function such as SHA-1 or SHA-2.
Technically speaking on the basis of cryptographic hash functions, it is not possible for a casino to cheat a player; but, this is a game of money and money makes the mare go.
They are typically used when the proof cannot be carried out using weaker assumptions on the cryptographic hash function.
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value.
In other words, they claimed that the first 608 bits of the 32-bit version and1216 bits of the 64-bit version of RadioGatún can be used as a cryptographic hash value.
A hash chain is a successive application of a cryptographic hash function h{\displaystyle h} to a string x{\displaystyle x.
Most modern cryptographic hash functions process messages in fixed-length blocks; all but the earliest hash functions include some sort of padding scheme.
File hash conditions can be used with any application because a cryptographic hash value of the application is generated at the time the rule is created.
And cryptographic hash functions(which are designed to be computationally indistinguishable from truly random functions) are usually too slow to be used in hash tables.
Random oracles are typically used as an ideal replacement for cryptographic hash functions in schemes where strong randomness assumptions are needed of the hash function's output.
A cryptographic hash function has provable security against collision attacks if finding collisions is provably polynomial-time reducible from problem P which is supposed to be unsolvable in polynomial time.
Cycle detection, the problem of following a path in a functional graph to find a cycle in it, has applications in cryptography and computational number theory, as part of Pollard's rho algorithm for integer factorization andas a method for finding collisions in cryptographic hash functions.