Примеры использования Key generation на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
CSP_102 key generation.
Key Generation for ACE encryption scheme.
We considered a model of the control error rate and the rate of key generation.
Spora key generation and encryption.
ISAKMP defines payloads for exchanging key generation and authentication data.
Key generation for the ACE public-key signature scheme.
DWORD dwPBKDF2IterationCount iteration counter in the PBKDF2 key generation algorithm.
Dynamic key generation according to the starting time.
I feel, I mean, I really feel I really feel that we are a key generation, I really do.
Key generation takes place by means of an algorithm called hashing.
We studied the dependence of the error key generation systems and noise-threshold comparator UPF.
The key generation algorithm is used in the encryption of user's Master Key and credential history.
I really feel that… that this generation, is a key generation to Jesus coming back.
List of rules of key generation when a new row is inserted in automatic mode.
Juels and J. Guajardo proposed a method(KEGVER)through which a third party can verify RSA key generation.
Key changing" is used for a new key generation and for sending a request for certificate.
Key Generation Alice chooses a random number a( mod Φ n( q)){\displaystyle a\{\pmod{\Phi_{n}(q)}}} as her private key.
Note: Key_P1 inititalization, random, corporate key generation must execute on secure PC.
Windows handles key generation automatically and implements the following keying properties that maximize protection.
These capabilities are built on native Windows libraries for cryptographic operations, such as RSA and AES key generation.
A registration key generation system can be easily embedded into automated registration systems such as ShareIt!
Subscriber private keys generated on the file system are protected by a standard password“123456” which shall be changed immediately by the subscriber after key generation.
RNG for key generation that is used in the DiskCryptor, belongs to the accumulative RNG type with multiple sources of entropy.
These formats provide a consistent framework for transferring key andauthentication data which is independent of the key generation technique, encryption algorithm and authentication mechanism.
A registration key generation system can be easily embedded into automated registration systems such as ShareIt!, RegNow, Plimus, and others.
In 2010, Burkov was among those who initiated the establishment of the Eurasia Network Operators' Group(ENOG) andalso took part in Key Generation Ceremony and signing of the DNS root zone using the DNSSEC technology.
This second function(called temporary key generation) uses more XORs and two operations which are equivalent to modular multiplications.
For example: IKE describes a protocol using part of Oakley and part of SKEME in conjunction with ISAKMP to obtain authenticated keying material for use with ISAKMP, and for other security associations such as AH and ESP for the IETF IPsec DOI ISAKMP defines the procedures for authenticating a communicating peer, creation andmanagement of Security Associations, key generation techniques and threat mitigation e.g. denial of service and replay attacks.
This assures that the key generation process was not modified and that the private key cannot be reproduced through a kleptographic attack.
Kleptographic attacks have been designed for RSA key generation, the Diffie-Hellman key exchange, the Digital Signature Algorithm, and other cryptographic algorithms and protocols.