Приклади вживання Alice and bob Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Alice and Bob.
Name them Alice and Bob.
Alice and Bob are in the same laboratory.
I will call them Alice and Bob.
Alice and Bob are archetypes in cryptography;
Most of the time, Alice and Bob will get opposite answers.
Alice and Bob both have the secret key.
Assume parts of a maximallyentangled Bell state are distributed to Alice and Bob.
Imagine Alice and Bob decided to communicate using the Caesar cipher.
While they can listen in on messages between Alice and Bob, they cannot modify them.
How could Alice and Bob agree on a secret color without Eve finding it out?
Because of the entanglement these particles started with, Alice and Bob have now created two entangled black holes.
First, Alice and Bob agree publicly on a prime modulus and a generator.
This is a good time to also introduce our friends, Alice and Bob, who are gonna be with us throughout the quarter.
Alice and Bob live in tree forts, which are far apart, with no line of sight between them.
Alice and Bob add their private colors to the other person's mixture,and arrive at a shared secret color.
In quantum field theory,this assumption can be replaced by the assumption that Alice and Bob are spacelike separated.
Alice and Bob know this secret key, but an attacker looking at the conversation has no idea what the key K is.
So in a symmetric encryption system, basically, the two parties, Alice and Bob, share a secret key k, which the attacker does not know.
Alice and Bob repeat this process in 5 years when they buy a $240,000 home on $65,000 income and regress.
In this particular case,the perpetrator is not completely anonymous anymore, as both Alice and Bob now know"who did it" with a probability of 1.
So Alice and Bob are trying to communicate securelyand there is an attacker who's trying to eavesdrop on their conversation.
Now I want to make a minor philosophical point, that in fact storing encrypted files on disk isvery much the same as protecting communication between Alice and Bob.
It's clear that Alice and Bob can make measurementsand compare their assertions about the result of the coin toss.
Next, Alice and Bob both randomly select private colorsand mix them into the public yellow in order to disguise their private colors.
Consider two friends, Alice and Bob, who live far apart from each otherand who talk together daily over the telephone about what they did that day.
Now once Alice and Bob have the shared key, you can use this key to communicate securely by properly encrypting data between them.
This would allow Alice and Bob to communicate classical bits between each other(possibly across space-like separations, violating causality).