Примеры использования Encryption algorithms на Английском языке и их переводы на Русский язык
{-}
- 
                                                                                        Official
                                                                                    
 - 
                                                                                        Colloquial
                                                                                    
 
Supports 8 encryption algorithms.
The first implementation of DPAPI used in Windows 2000 had other Master Key encryption algorithms.
His encryption algorithms are beyond the beyond the beyond.
Restrictions on editing a Word document do not use encryption algorithms resistant to cracking.
He highlighted the encryption algorithms and encryption  methods supported by"BitLocker.
Please note that restrictions on editing a Word document do not use encryption algorithms strong to cracking.
In addition, RC5 and RC6 encryption algorithms are commonly implemented in the released files.
All information, including passwords, credit cards and other data,is protected with strong encryption algorithms.
NIST standardized the FF1 and FF3 Format-Preserving Encryption algorithms in its Special Publication 800-38G.
There is nothing that can be safe in the world, andthere are quite a few means to open data without breaking encryption algorithms.
Use when creating a protected disk Crypto-resistant encryption algorithms GOST 28147-89, AES(256), BlowFish 448.
Some advanced encryption algorithms which have been applied into cloud computing increase the protection of privacy.
Security methods are combinations of integrity algorithms  and encryption algorithms that protect the key exchange.
The table 2 shows the default Master Key encryption algorithms for various operating systems, as well as the analysis of their protection from a potential brute force attack.
All passwords are filtered from all our logs andare one-way encrypted in the database using reliable encryption algorithms.
VIPole employs effective technologies and strong encryption algorithms to ensure the safety of all transferred data.
ESP can optionally provide data confidentiality services by encrypting the ESP payload with one of several supported encryption algorithms.
An exclusive set of features and enhanced encryption algorithms will help you to make sure that your correspondence is kept private and important files and documents do not fall into the hands of third parties.
In the version 2015.3 and earlier of our products, the RC4 40 and 128-bit,AES 256 bit encryption algorithms when you export a report to PDF using.
New cryptographic support- strengthened encryption algorithms to comply with U.S. government security requirements, in addition to removing algorithms  which could not be strengthened.
You may have already heard of these two terms- symmetric and asymmetric(aka public-key)encryption-  when describing encryption algorithms.
Examine documentation about the system used to protect the PAN, including the vendor,type of system/process, and the encryption algorithms(if applicable) to verify that the PAN is rendered unreadable using any of the following methods.
To be clear: Not all ransomware families have had decryptors created for them,in many cases because the ransomware is utilizing advanced and sophisticated encryption algorithms.
However, some authors consider such encryption algorithms to be conceptually simpler and easier to work with, and more versatile in practice-and most IND-CPA encryption algorithms  apparently do, in fact, produce encrypted messages that are indistinguishable from random bits.
Corporation Microsoft denied appeared in media information that allegedly«Microsoft does not eliminate transferring Skype encryption algorithms to the Special Services of RF.
NSA has helped develop several major standards for secure communication: the Future Narrow Band Digital Terminal(FNBDT) for voice communications, High Assurance Internet Protocol Interoperability Encryption-  Interoperability Specification(HAIPE) for computer networking andSuite B encryption algorithms.
According to the company, this file system is optimized specifically for flash and SSD storage andutilizes strong encryption algorithms to store data securely no matter what device you have.
Use this option to allow the network connection, after authentication succeeds,to send and receive unencrypted network traffic while the encryption algorithms are negotiated.
Alex: Yes, as I said, because of very limited budget, almost everything had to be done myself- from interface design and animation to video editing,website development, encryption algorithms, etc., not to mention the legal difficulties of opening a company and debugging monetization system, which was done abroad.
Microsoft will not disclose Skype- encryption  to special services of Russia Corporation Microsoft denied appeared in media information that allegedly«Microsoft does not eliminate transferring Skype encryption algorithms to the Special Services of RF.