Examples of using Hash function in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
reverse cryptographic hash function, and good old-fashioned brute force.
each corresponding to a different randomly chosen hash function g.
Microsoft's Xbox game console, where the cipher was used as a hash function.
RadioGatún can be used either as a hash function or a stream cipher;
Although the cryptographic construction that is used is based on the MD5 hash function, collision attacks were in 2004 generally believed to not affect applications where the plaintext(i.e. password) is not known.
RadioGatún does not have Panama's weaknesses when used as a hash function.
the word width used) of RadioGatún's output is a cryptographically secure hash function.
related-key attacks make it potentially less secure for use in a hash function than for encryption.
She then applies the hash function to all these variations until she finds a version of the fair contract
Although most cryptocurrencies use the SHA-256 hash function, the same ASIC technology could be used to create hashcash solvers that are three orders of magnitude faster than a consumer CPU,
Researchers have since discovered a flaw in WPA that relied on older weaknesses in WEP and the limitations of the message integrity code hash function, named Michael,
The hash function creates a message digest,
A hash function built with the Merkle-Damgård construction is as resistant to collisions as is its compression function; any collision for the full hash function can be traced back to a collision in the compression function. .
The hash function h a,
rather than the 280 expected for a 160-bit hash function.
completely thwart a theoretically efficient binary tree or hash function implementation.
an additional orthogonal hash function is chosen to hash the large partition into sub-partitions,
Basically, you would hash the data using a collision resistance hash function; write the hash into read-only memory.
Each hash function in the family is indexed by a choice of random a{\displaystyle\mathbf{a}} and b{\displaystyle b}
the hash function h a,