在 英语 中使用 Public-key cryptography 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
Coprocessor Public-key cryptography TLS Stunnel.
The most dangerous attack by quantum computers is against public-key cryptography.
In Public-key cryptography, two keys are generated for a user.
If that happens, we will face a world without strong public-key cryptography.
The public-key cryptography standard that governs security devices such as smart cards.
If that happens, we will face a world without strong public-key cryptography.
In short, public-key cryptography, together with digital scarcity, have given us digital hard money.
The problem of transferability, on the other hand,can be solved by using public-key cryptography.
It combines smart tokenization with public-key cryptography, open protocols and developer APIs.
Public-key cryptography is most often used for encrypting messages between two people or two computers in a secure way.
Specifically, a unique application of public-key cryptography is to generate unforgeable digital signatures.
Public-key cryptography is most often used for encrypting messages between two people or two computers in a secure way.
PKCS 12 is one of the family of standards called Public-Key Cryptography Standards(PKCS) published by RSA Laboratories.
In short, public-key cryptography, together with digital scarcity, have given us digital hard money.
There was no vote for whether 3D printed guns, public-key cryptography, Bitcoin, or BitTorrent should exist.
In short, public-key cryptography, together with digital scarcity, have given us digital hard money.
Because virtually all internet applications use both symmetric and public-key cryptography, both forms need to be secure.
It is an SFS that uses public-key cryptography to self-certify objects published by users of the network.
For example, Adobe Systems grants permissions to enable additional features in Adobe Reader,using public-key cryptography.
Diffie, Hellman& Merkle discovered public-key cryptography, the first ever asymmetric cipher, in 1976.
Public-key cryptography is a fundamental element of blockchain technology- it is the underlying technology for wallets and transactions.
Some people say that it can be solved using public-key cryptography, while others think that distributed blockchain is the solution.
If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we will still survive.
Bitcoin employs a special type of cryptography, called public-key cryptography, in order to facilitate its system of storing and transferring of value.
This article will cover some important cryptography topics that relate to blockchain technology including public-key cryptography, hashing, and Merkle trees.
Unlike Proof-of-Work and Public-Key Cryptography, the third component of Bitcoin is not based on math, but human behavior.
Furthermore, public-key cryptography can be used not only for privacy(encryption), but also for authentication(digital signatures).
Like bitcoin and Litecoin, Dogecoin functions using public-key cryptography, in which a user generates a pair of cryptographic keys: one public and one private.
Furthermore, public-key cryptography can be used not only for privacy(encryption), but also for authentication(digital signatures) and other various techniques.
Hash functions and public-key cryptography are at the core of digital signature systems, which are now applied to a wide range of use cases.