Examples of using Hashing in English and their translations into Russian
{-}
-
Official
-
Colloquial
Data structures, hashing.
Binary search, hashing, strings, two pointers.
Ssdeep- ssdeep Fuzzy Hashing.
Object hashing is not reliable enough.
Crypt- One-way string hashing.
Password hashing algorithm FIPS 180-2 SSA-224.
Hash_copy- Copy hashing context.
Binary search, data structures, hashing.
Fuzzy hashing can match signatures which have.
Dfs and similar, hashing, strings.
Currently supported methods are modulo and consistent hashing.
Password Hashing- Safe Password Hashing.
Session ID generation without hashing.
Supplier may use hashing functions SHA-2 or higher.
Hash_update- Pump data into an active hashing context.
The primary hashing algorithm used in Configuration Manager 2007 is SHA-1.
Hash_init- Initialize an incremental hashing context.
Because of application of hashing it's difficult to perform the access to passwords by the intruders.
The default(Jenkins one-at-a-time) item key hashing algorithm.
Tries support extendible hashing, which is important for search engine indexing.
Imagine that you have a hardware with 1 MH/s hashing speed.
Uses the Message Digest 5(MD5) hashing scheme to encrypt the response.
A0h' Tag: data field contains DOs relevant for hashing'16h.
This is not faster than normal hashing, and gives more collisions.
Cuckoo hashing was first described by Rasmus Pagh and Flemming Friche Rodler in 2001.
The default algorithm to use for hashing if no algorithm is provided.
It is highly recommended to enable this option if you want to use consistent hashing.
The hashing result of a valid Proof-of-Work value must be lower than current target.
Hash_algos- Return a list of registered hashing algorithms.
Locality-sensitive hashing(ISH) is a method of performing probabilistic dimension reduction of high-dimensional data.