英語 での Cryptographic の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Cryptographic Modules.
Additional Cryptographic Providers.
Cryptographic hashes and message digests.
Hierocrypt- 3 Cryptographic.
Cryptographic signature and verification of messages.
人々も翻訳します
CIPHERUNICORN- E Cryptographic.
Any good cryptographic hash function satisfies these three.
The two cryptos also employ different cryptographic algorithms.
Many cryptographic protocols are subject to OFFLINE ATTACKS.
Passes world's first verifiable cryptographic proof of reserves audit.
Cryptographic protocols and security mechanisms.
Currently, the most used cryptographic hash functions are MD5 and SHA-1.
This includes the choice of reliable hash functions and cryptographic systems.
The various cryptographic systems vary in strength and performance.
MD5CryptoServiceProvider Computes the MD5 hash value for theinput data using the implementation provided by the cryptographic service provider(CSP).
CIPHERUNICORN-A Cryptographic specifications CIPHERUNICORN-A.
Superior- The evidence has been confirmed as genuine by trained personnel andappropriate technologies including the integrity of any physical and cryptographic security features.
CIPHERUNICORN-E Cryptographic specifications CIPHERUNICORN-E.
Cryptographic hash functions are used for authentication, digital signatures, and message authentication codes.
Three billion XRP released out of cryptographic escrow, 2.7 billion XRP returned to escrow.
Strong cryptographic authentication is needed in the near future for many protocols.
This proving system makes stronger cryptographic assumptions, but has smaller proofs and faster proving/verification.
Implements a cryptographic Random Number Generator(RNG) using the implementation provided by the cryptographic service provider(CSP).
Expanding the Fence In addition to its direct cryptographic defenses, the DS5250 can extend its security cloak to the system.
At the heart of all cryptographic systems is the generation of secret, unguessable(i.e., random) numbers.
Digital signatures deploy cryptographic systems, such as hash functions, public-key cryptography, and encryption techniques.
Integration with Solaris 10 Cryptographic Framework allows use of capabilities such as the Niagara Cryptographic Framework(NCP).
Integration with Solaris 10 Cryptographic Framework allows use of capabilities such as the Niagara Cryptographic Framework(NCP).
HMAC can be used with any iterative cryptographic hash function, such as MD5 or SHA-1, in combination with a secret shared key.