英語 での Cryptographic techniques の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Cryptographic Techniques.
The Block Cipher SC2000 Cryptographic Techniques Specifications.
The Cryptographic Techniques Monitoring Subcommittee.
Quantum computers threaten the security of certain cryptographic techniques.
The Cryptographic Techniques.
However, an increasing number of products enable this to be done without fancy hardware,using cryptographic techniques.
Called cryptographic techniques and the application period are as follows.
Call for attack to evaluate the cryptographic techniques submitted in FY 2009.
Cryptographic techniques' candidates were openly called by IPA and TAO.
Progress reports on the evaluation of cryptographic techniques on security and implementation.
We would like to receive awide range of comments from everyone on the evaluation of this year's cryptographic techniques.
Approved cryptographic techniques are required at AAL2 and above.
Towards the revision of the e-Government Recommended Ciphers List in FY 2012,CRYPTREC is going to evaluate the cryptographic techniques submitted in FY 2009.
Today's most elaborate cryptographic techniques tend to be based on extraordinarily difficult mathematical problems.
Publication of Comments in Evaluation Comments received by December 15,2001 will be included in the cryptographic techniques evaluation workshop to the extent possible.
Enigma uses cryptographic techniques to allow individual data sets to be split between nodes, and at the same time run bulk computations over the data group as a whole.
Besides, Monero very high confidentiality by cryptographic techniques that link the signature to 9 doubled in 24 months.
Cryptographic techniques, for example Pretty Good Privacy(PGP) or Privacy Enhanced Mail(PEM) can provide effective ways of securing e-mail.
International Workshop on Cryptographic Techniques and E-Commerce(CrypTEC'99).
Cryptographic Techniques Understanding SSL requires an understanding of cryptographic algorithms, message digest functions(aka. one-way or hash functions), and digital signatures.
Please refrain from making comments on topics not related to cryptographic techniques evaluation or comments that may conflict with Export Administration Act and the like.
In the Cryptographic Techniques Evaluation Workshop, you can look forward in particular to comments by authors presentators on presentations made in Sessions 1 and 2 as well as explanations of problems in the submitted documents, and recent analysis results.
Application on date of workshop Submit a hard copycontaining the rump session application information to the Cryptographic Techniques Evaluation Workshop registration desk by 6:30 p.m.
Where possible, use cryptographic techniques to authenticate information and keep the information private(but don't assume that simple encryption automatically authenticates as well).
To this end, the cryptographic technique evaluation project was organized for the scheduled period of three years, beginning in the 2000 fiscal year,to list up the cryptographic techniques that are judged to be excellent in security and implementation by objective evaluation, and this project was named CRYPTREC(Cryptography Research and Evaluation Committees).
We may refer to comments during cryptographic techniques evaluations including cryptographic techniques evaluation workshops, and CRYPTREC Report 2001, which is scheduled for release at the end of the current fiscal year.
Efficiency: Most of the existing poker protocols rely on costly cryptographic techniques that incur high computational and communication overheads, which in the real world result in boring games with long delays.
He is of the idea that the cryptographic techniques that he came up with a few years ago will help him reinvent cryptocurrency that will fix some of the critical and fundamental problems facing this industry such as privacy, speed, scalability, and tremendous resistance to future disasters that could cripple the entire industry.
Preserve privacy for model training and inference using cryptographic techniques Cryptographic methods are useful when multiple owners of data need to rely on each and don't necessarily trust each other.
According to the current Copyright Law, an act(ripping) of avoiding cryptographic techniques used in copy-controlled CDs and DVDs and reproducing the same is not within the scope of reproduction intended for private use, and is prohibited as infringement of reproduction rights.