Ví dụ về việc sử dụng Public keys trong Tiếng anh và bản dịch của chúng sang Tiếng việt
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Public keys and private keys come in pairs.
N will be used as the modulus for both the private and public keys.
Public keys and private keys are related mathematically.
The construction included private keys for both public keys.
Unlike the public keys, the private key must be kept secret.
Mọi người cũng dịch
Both you and your correspondent should verify the fingerprints of the public keys you have exchanged.
Public keys are often distributed in a signed public key certificate.
PGP uses key IDs to refer to public keys for a variety of purposes.
Public keys are easy to create but the identifying features can also be falsified.
Both you andyour correspondent must follow the steps below to import each other's public keys.
It uses private and public keys to send and receive information(transactions).
A paper walletis a piece of paper containing both the private and public keys to a single bitcoin address.
In the 1980s, public keys based on lattices were too long, requiring megabytes of data to transmit.
GPG would be prettyuseless if you could not accept other public keys from people you wished to communicate with.
Public keys are long, so you can't just pick up a secure phone and read out the characters to the other person.
The Digital Ocean control allows you to add public keys to your new droplets when they're created.
When you create a wallet, the system will generate a file withtext data that will include private and public keys.
As with the private and public keys, this signature is normally represented by a hexadecimal string.
The cryptographically secure key pairs are generated using elliptic curve cryptography andconsist of private and public keys.
They could use public keys to selectively share information relating to a particular service transaction with agencies.
There is a simple command which will put your public key directly to the remoteserver's authorized_keys file this file keeps all the public keys.
Anyone can see the public keys of any transaction they want(although there are no names associated with transactions).
It typically contains references to preceding transactions andassociates a certain number of bitcoins with one or several public keys(Bitcoin addresses).
At the same time, using private and public keys, users themselves determine who should be given access to their personal data.
Conversely, asymmetric encryptionsolves the problem of key distribution by using public keys for encryption and private keys for decryption.
With EmerSSH, users can manage their own public keys by submitting and modifying records in the Emercoin blockchain via the GUI or command line.
A Multi signature transaction is where N public keys are set with condition that at least M of those are required for a signature.
Luckily, instead of verifying the entire public keys of both parties, you can simply compare the“fingerprint” derived from these keys. .
Unlike most blockchains that use public keys to distinguish virtual address spaces, RChain divides its virtual address space into namespaces.