Ejemplos de uso de AES algorithm en Inglés y sus traducciones al Español
{-}
-
Colloquial
-
Official
Block encryption based on AES algorithm.
The more secure AES algorithm is recommended.
Protect your data with strong AES algorithm.
Our systems use AES algorithm with key lengths of 128 bits or higher.
Your photos are encrypted using the AES algorithm.
AES_196- encryption with the AES algorithm with the 196-bit key length.
Note that all your messages are surely protected by AES algorithm.
This procedure uses the AES algorithm as an example.
The D.E.A. tried to decrypt it on-site, butit's got an AES algorithm.
The classic PkZip protection or the AES algorithm with the 128, 196 or 256-bit key length.
Free Application is used for encrypting anddecrypting files with AES algorithm.
This paper gives an overview of the AES algorithm and the Intel® AES-NI.
Delivers seven new instructions(AES instruction set or AES-NI) that can be used by the AES algorithm.
Two hexadecimal random numbers for the AES algorithm for ESP encryption.
Figure 5.17: Number of cycles per PC in the optimised processor running the AES algorithm.
Because you don't use an AES algorithm with a key length of 256 just to stop people from circumventing DiSEqC Protocols.
In the following example,a secret key for the AES algorithm is created.
Dotcom has said that data on the Mega service will be encrypted client-side using the AES algorithm.
When you protect your files,you're encrypting using the AES algorithm, the same used by banks to protect their customer data.
Security researchers Michael Gillespie, Lawrence Abrams and other computer experts from MalwareHunterTeam analyzed this malware andfound it adopting AES algorithm for encryption.
The 7z format supports encryption with the AES algorithm with a 256-bit key.
In June 2003,the U.S. Government announced that AES could be used to protect classified information: The design and strength of all key lengths of the AES algorithm(i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level.
It utilizes the AES encryption algorithm, appending the extension“. cryeye”.
Set the authentication mode to WPA2-Enterprise, and encryption algorithm to AES.
And algorithm called AES is typically used to encrypt the data that is sent to.
By default, it uses the AES encryption algorithm in cipher block chaining(CBC) or XTS mode with a 128-bit or 256-bit key.
Select the type of algorithm, AES, or TKIP+ AES. .