- letter hash
- 字母散列
English-Chinese computer dictionary (英汉计算机词汇大词典). 2013.
English-Chinese computer dictionary (英汉计算机词汇大词典). 2013.
Hash function — A hash function is any well defined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an index into an array. The values returned by a hash function are called hash values, hash… … Wikipedia
hash — n hashish (cannabis resin). Hashish from North Africa, the Middle East and the Himalayas is the most widely used form of cannabis in Britain, especially among white smokers, while grass (herbal can nabis) is more common in the USA. This shortened … Contemporary slang
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Number sign — Not to be confused with the Chinese character 井, or the Sharp sign ♯. # Number sign … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Wikipedia:Manual of Style — This guideline is a part of the English Wikipedia s Manual of Style. Use common sense in applying it; it will have occasional exceptions. Please ensure that any edits to this page reflect consensus. Shortcuts … Wikipedia
Magnet URI scheme — Magnet icon The magnet: URI scheme is a draft open standard defining a URI scheme for magnet links, which are mainly used to reference resources available for download via peer to peer networks. Such a link typically identifies a file not by… … Wikipedia
crypt (Unix) — In Unix computing, crypt is the name of both a utility program and a C programming function. Though both are used for encrypting data, they are otherwise essentially unrelated. To distinguish between the two, writers often refer to the utility… … Wikipedia
Poor man's copyright — refers to the method of using registered dating by the postal service, a notary public or other highly trusted source to date intellectual property, thereby helping to establish that the material has been in one s possession since a particular… … Wikipedia