- Sort Score
- Result 10 results
- Languages All
Results 161 - 170 of 764 for Hashing (6.57 sec)
-
testing/internal-integ-testing/build.gradle.kts
api(project(":build-operations")) api(project(":concurrent")) api(project(":core")) api(project(":core-api")) api(project(":dependency-management")) api(project(":hashing")) api(project(":internal-testing")) { because("Part of the public API") } api(project(":stdlib-java-extensions")) api(project(":jvm-services")) {
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Tue Jun 11 09:51:14 UTC 2024 - 7.6K bytes - Viewed (0) -
tensorflow/compiler/mlir/lite/quantization/device_target.h
#define TENSORFLOW_COMPILER_MLIR_LITE_QUANTIZATION_DEVICE_TARGET_H_ #include <functional> #include <optional> #include "llvm/ADT/ArrayRef.h" #include "llvm/ADT/DenseMap.h" #include "llvm/ADT/Hashing.h" #include "llvm/ADT/MapVector.h" #include "llvm/ADT/STLExtras.h" #include "llvm/ADT/SmallVector.h" #include "llvm/ADT/StringMap.h" #include "llvm/ADT/StringRef.h" #include "llvm/Support/ErrorHandling.h"
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Fri Mar 08 10:41:08 UTC 2024 - 7.1K bytes - Viewed (0) -
tensorflow/compiler/mlir/tfrt/analysis/cost_analysis.cc
mlir::TF::LookupTableFindV2Op op) { // tf.LookupTableFindV2 ops are usually more costly than tf.AddV2 with the // same input size, as it involves more operations like hashing, map lookup, // etc. constexpr int64_t kLookupTableFindCostScale = 8; constexpr int64_t kLookupTableFindStringKeyCostScale = 16; auto value_type = mlir::cast<mlir::TensorType>(op.getValues().getType());
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Thu Apr 25 16:01:03 UTC 2024 - 7.6K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_legacy.go
excess := len(hash)*8 - orderBits if excess > 0 { ret.Rsh(ret, uint(excess)) } return ret } var errZeroParam = errors.New("zero parameter") // Sign signs a hash (which should be the result of hashing a larger message) // using the private key, priv. If the hash is longer than the bit-length of the // private key's curve order, the hash will be truncated to that length. It
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 4.8K bytes - Viewed (0) -
src/vendor/golang.org/x/crypto/sha3/shake.go
// license that can be found in the LICENSE file. package sha3 // This file defines the ShakeHash interface, and provides // functions for creating SHAKE and cSHAKE instances, as well as utility // functions for hashing bytes to arbitrary-length output. // // // SHAKE implementation is based on FIPS PUB 202 [1] // cSHAKE implementations is based on NIST SP 800-185 [2] // // [1] https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 5.4K bytes - Viewed (0) -
docs/de/docs/project-generation.md
* **Sicheres Passwort**-Hashing standardmäßig. * **JWT-Token**-Authentifizierung. * **SQLAlchemy**-Modelle (unabhängig von Flask-Erweiterungen, sodass sie direkt mit Celery-Workern verwendet werden können).
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Sat Mar 30 18:14:36 UTC 2024 - 6.5K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
!!! danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ## Multiple models Here's a general idea of how the models could look like with their password fields and the places where they are used: === "Python 3.10+"
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Thu Apr 18 19:53:19 UTC 2024 - 7.7K bytes - Viewed (0) -
src/crypto/tls/key_schedule.go
return nil, nil, err } return c, kyberSharedSecret(ss, c), nil } func kyberSharedSecret(K, c []byte) []byte { // Package mlkem768 implements ML-KEM, which compared to Kyber removed a // final hashing step. Compute SHAKE-256(K || SHA3-256(c), 32) to match Kyber. // See https://words.filippo.io/mlkem768/#bonus-track-using-a-ml-kem-implementation-as-kyber-v3. h := sha3.NewShake256() h.Write(K) ch := sha3.Sum256(c)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 14:56:25 UTC 2024 - 6.5K bytes - Viewed (0) -
README.md
Guava is a set of core Java libraries from Google that includes new collection types (such as multimap and multiset), immutable collections, a graph library, and utilities for concurrency, I/O, hashing, primitives, strings, and more! It is widely used on most Java projects within Google, and widely used by many other companies as well. Guava comes in two flavors:
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Fri May 31 17:43:52 UTC 2024 - 5.9K bytes - Viewed (0) -
docs/pt/docs/tutorial/extra-models.md
Se não souber, você aprenderá o que é uma "senha hash" nos [capítulos de segurança](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ## Múltiplos modelos Aqui está uma ideia geral de como os modelos poderiam parecer com seus campos de senha e os lugares onde são usados: === "Python 3.8 and above"
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Fri Mar 22 01:42:11 UTC 2024 - 7.8K bytes - Viewed (0)