Subject | English | Portuguese |
comp., MS, Braz. | hash algorithm | algoritmo de hash (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
comp., MS | hash algorithm | algoritmo hash (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
IT, dat.proc. | hash-code | código hash |
comp., MS | hash code | código hash (A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing) |
IT | hash coding | endereçamento disperso |
comp., MS | hash function | função hash (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
comp., MS, Braz. | hash function | função de hash (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
stat. | hash function | função hash |
commun. | hash line | parasita radar sobre ecrã de tubo catódico |
commun., IT | hash sign | cardinal |
commun., IT | hash sign | cerquilha |
comp., MS, Braz. | hash table | tabela de hash (A data structure that carries out a mathematical calculation on a field identifier to determine where a data element in a large table or index is located) |
comp., MS | hash table | tabela hash (A data structure that carries out a mathematical calculation on a field identifier to determine where a data element in a large table or index is located) |
IT | hash table search | pesquisa por cálculo de endereço |
IT | hash total | soma de teste |
IT | hash total | total de controlo |
law, IT | hash total | total abstrato |
comp., MS, Braz. | Secure Hash Algorithm 1 | Secure Hash Algorithm 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |
comp., MS | Secure Hash Algorithm 1 | Algoritmo Hash Seguro 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |