Examples of using Hashing in English and their translations into Russian
{-}
-
Official
-
Colloquial
Hash_update- Pump data into an active hashing context.
Crypt- One-way string hashing.
Currently supported methods are modulo and consistent hashing.
It is highly recommended to enable this option if you want to use consistent hashing.
challenge string and hashing algorithm.
Consistent hashing achieves some of the same goals as rendezvous hashing also called HRW Hashing. .
Session ID generation without hashing.
Do not connect more than one PSU to the same hashing board.
DSA-2150-1 request-tracker3.6-- unsalted password hashing.
Key generation takes place by means of an algorithm called hashing.
This assumption is unrealistic for most applications of hashing.
Data structures, divide and conquer, hashing.
perfect hashing function, thus guaranteeing worst case O(1) lookup time.
Selects to not use a hashing function, but merely use a modulo to find the bucket list index.
For example, the value 3 matches a bundle of the SHA-256 hashing algorithm and the AES-256 block encryption algorithm.
The basic idea of cuckoo hashing is to resolve collisions by using two hash functions instead of only one.
Covariate Hashing trick Kernel method List of datasets for machine learning research Space mapping"Machine Learning and AI via Brain simulations" PDF.
Amusingly, the same hashing function is also used in validating users' logon passwords,
Technically, digest authentication is an application of MD5 cryptographic hashing with usage of nonce values to prevent replay attacks.
Andres Rojas Guerrero discovered that the password hashing API allows an attacker to send specially crafted requests resulting in CPU and memory exhaustion.