Subject | English | Arabic |
comp., MS | hash algorithm | لوغاريتم التجزئة (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
comp., MS | hash code | شفرة التجزئة (A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing) |
comp., MS | hash function | دالة تجزئة (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
prof.jarg. | hash meat griller | كبابجي (هو شوا اللحم المفروم; http://tarek.kakhia.org/) |
comp., MS | hash table | جدول التجزئة (A data structure that carries out a mathematical calculation on a field identifier to determine where a data element in a large table or index is located) |
comp., MS | Secure Hash Algorithm 1 | لوغاريتم التجزئة الآمن 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |