داستان آبیدیک

hash function


فارسی

1 کامپیوتر و شبکه:: تابع هش

1 Concretely we instantiate hash functions with SHA3-256 [17] and digital signatures with EdDSA using the ed- The authenticator is formed from the root of a full binary tree created from the strings, labeling leaves as H(i si) and internal nodes as H(left right), where H is a cryptographic hash function (which we will refer to as a hash).6 The function f , which the prover wishes to authenticate, is an inclusion proof that a key-value pair (k, v) is within the map D. 6 Secure Merkle trees must use different hash functions to hash the leaves and internal nodes to avoid confusion between While we have omitted this detail in the example for simplicity, the Libra protocol uses a unique hash function to distinguish between different hash function types to avoid attacks based on type confusion [23].

واژگان شبکه مترجمین ایران


معنی‌های پیشنهادی کاربران

نام و نام خانوادگی
شماره تلفن همراه
متن معنی یا پیشنهاد شما
Captcha Code