The number of hashes being recovered simultaneously does not have significant performance impact .
数字切细同时恢复没有重大表现冲击。
In our bank transfer example , assume we use a primitive mac that hashes the request along with a secret key .
在银行划拨范例中,假设我们使用了一种随秘钥杂凑请求的原始mac。
The file is not a valid assembly . Hashes can only be imported from assembles .
案不是有效的件。只能件入。
If the hashes agree , chktrust . Exe verifies that the signer 's x.509 certificate can be traced back to a trusted root certificate .
如果二者一致,chktrust.exe将验证签名程序的x.509证书是否可以追溯到受信任的根证书。
Beyond the basic storage of data , hashes are also important in distributed systems .
除了在数据储存中的应用外,哈希表在分布式系统中的应用也是非常重要的。
The important thing is how hashes work and how to tune them for maximum performance benefit .
所以最关键的是哈希函数是如何运行的,并怎样才能使其发挥最大的效用。
Hashes are statistically unique ; a different two-byte sequence will not hash to the same value .
哈希在统计上是唯一的;不同的双字节序列不会哈希为同一个值。
For hackers around the world , the huge trove of new leaked passwords is an opportunity to update their " rainbow tables " - vast databases that serve as a digital key for cracking encrypted passwords , called " hashes . "