SHA-1

SHA-1SHA-1
  1. Questions Management System Based on SHA-1 Safety Certification

    基于SHA-1安全认证的题库管理系统

  2. Statistical Analysis of One-way Hash Function SHA-1 and its Algorithm Improvement

    单向Hash函数SHA-1的统计分析与算法改进

  3. Application of SHA-1 Algorithm in the Design of Prepaid Intelligent Water Meter

    SHA-1算法在TM卡预付费智能水表设计中的实现

  4. Exchange Model of SHA-1 User Based on Smart Card

    基于智能IC卡的SHA-1使用者交易模型

  5. The Secure Transaction Scheme of Email based on SHA-1 and Java

    基于SHA-1和Java的电子邮件安全传输

  6. Research of digital signature based on SHA-1 and RSA in official document transmission

    公文传输过程中基于SHA-1和RSA的数字签名方案研究

  7. Analysis and Improvement to Algorithm of SHA-1

    对哈希算法SHA-1的分析和改进

  8. Hardware implementation of SHA-1 suiting to the wireless sensor network node chip

    适用于WSN节点芯片的SHA-1硬件实现

  9. However , verifying a stamp requires just one SHA-1 computation .

    然而,要确认一个戳记,只需要进行一次SHA-1计算即可。

  10. Just requiring a special SHA-1 hash value is not enough .

    只有一个特定的SHA-1散列值是不够的。

  11. An implementation of SHA-1 algorithm based on unrolling loops architecture

    一种基于循环展开结构的SHA-1算法实现

  12. Two that were used commonly in the past are MD5 and SHA-1 .

    过去常用的两个算法是MD5和SHA-1。

  13. By making an overall analysis , an efficient hardware architecture is proposed to speed up the SHA-1 algorithm .

    通过对SHA-1算法进行深入分析,提出了一种快速实现此算法的硬件方案。

  14. HDL Design and Simulation of SHA-1 Algorithm

    SHA-1算法的HDL设计与仿真

  15. This paper presents an optimized architecture of a SHA-1 accelerator , based on Security Hash Algorithm .

    本文基于安全Hash算法(SHA-1),提出了一种结构优化的SHA-1硬件加速器。

  16. The Comparison of MD5 and SHA-1 digital signature algorithms and their Optimum Realization Using AVR

    数字签名算法MD5和SHA-1的比较及其AVR优化实现

  17. Applying SHA-1 to object-relational access layer design

    SHA-1在对象-关系访问层设计中的应用

  18. SHA-1 is a fairly typical mathematical computation .

    SHA-1是一种非常典型的数学计算。

  19. HMAC / SHA-1 IP Design Based on TPM Specification

    基于TPM规范的HMAC/SHA-1IP设计

  20. Some weaknesses have been found in a more recent hashing algorithm , known as SHA-1 .

    另外,一些比较新的散列算法(SHA-1)也已经被发现有弱点。

  21. Choosing between MD5 and SHA-1 is a tradeoff between security and performance .

    在MD5和SHA-1之间作选择是安全性和性能之间的权衡。

  22. Soon after that , in February of 2005 , professor Wang deciphered SHA-1 algorithm .

    随后,在2005年2月14日,王小云教授的密码小组又破译了SHA-1算法。

  23. Carbon and oxygen isotopes of calcite cement in the lower part of the SHA-1 formation , the Dagang beach area

    大港滩海地区沙一段下部砂岩储层中方解石胶结物碳、氧同位素研究

  24. Then a detailed ASIC design of the SHA-1 algorithm module is given , whose logic on the longest critical path is optimized .

    随后给出了SHA-1算法模块的详细ASIC设计,优化了SHA-1模块最长关键路径上的逻辑结构。

  25. The manifest file contains the SHA-1 digests of the individual files in the OVF package .

    清单文件包含OVF包中各文件的SHA-1摘要。

  26. This paper describes the implementation of SHA-1 and MD5 in HMAC , and analyzes the superiority of the two algorithms .

    叙述了HMAC中SHA-1及MD5算法的实现,重点分析了这2种算法各自的优越性。

  27. Since MD5 hashing has been broken , the client wisely stipulated that all keys must be signed using SHA-1 instead .

    由于MD5散列法已经被破坏,客户明智地规定,所有密匙必须使用SHA-1签名。

  28. A bidirectional authentication chip utilizing the SHA-1 engine is designed by the standard design flow of ASIC . This chip has 32000 logic gates .

    采用ASIC设计标准流程,设计了一款基于SHA-1算法的双向认证芯片,该芯片规模为3万2千逻辑门。

  29. It 's clever because it is quite resistant to attack , even in the face of weaknesses in MD5 and SHA-1 .

    说它聪明的原因是即使面对MD5和SHA-1的弱点,它的防攻击能力还很强。

  30. An efficient hardware architecture was developed to speed up the widely used secure hash algorithm SHA-1 . The design shortens the critical path by adjusting the iterative method .

    目前最常用的安全散列算法是SHA-1算法,它被广泛地应用于电子商务等信息安全领域。为了满足应用对安全散列算法计算速度的需要,该文提出了一种快速计算SHA-1算法的硬件结构。