Examples of using Cryptographic hash in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.
File hash conditions can be used with any application because a cryptographic hash value of the application is generated at the time the rule is created.
Alternatively, a system owner or administrator can use a cryptographic hash function to compute a"fingerprint" at installation time that can help to detect subsequent unauthorized changes to on-disk code libraries.
A desired characteristic of a cryptographic hash algorithm is that(for all practical purposes) the hash result(referred
Currently popular cryptographic hash functions are vulnerable to length-extension attacks:
advertising identifiers, or a cryptographic hash of a common account identifier(such as an email address),
Indeed, in information-security contexts, cryptographic hash values are sometimes called(digital) fingerprints, checksums, or just hash values, even though all these terms stand for more general functions with rather different properties and purposes.
use a cryptographic hash, such as SHA-2, more salt(e.g. 64 bits
is a cryptographic hash function, and then using some secret key to sign f( m){\displaystyle fm.
are designed to meet much weaker requirements, and are generally unsuitable as cryptographic hash functions.
It was first publicly presented at the NIST Second Cryptographic Hash Workshop, held in Santa Barbara,
it can be feasible to invert a hash by trying all possible messages in the set. Because cryptographic hash functions are typically designed to be computed quickly,
standalone tool that performs cryptographic hashes.
Digest authentication is an application of MD5 cryptographic hashing with usage of nonce values to prevent replay attacks.
Using cryptographic hashes, no document will be shared publicly,
These passwords were stored as cryptographic hashes in the source data breaches,
are stored as cryptographic hashes in the table mdl_user.
Passwords are hashed, which means the cache of passwords are converted into a collection of cryptographic hashes, random-looking strings of characters to prevent them from being misused.
implement many cryptographic primitives, including cryptographic hashes, message authentication codes,
A public address is the cryptographic hash of a public key.