Examples of using Cryptographic in English and their translations into German
{-}
-
Computer
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Programming
-
Official/political
-
Political
Cryptographic protocol(Annex No 5.1);
Day of regime and cryptographic service.
Cryptographic Hash Functions: MD5, SHA1,….
DSA 875: openssl094-- Cryptographic weakness.
GnuPG-- Cryptographic weakness in ElGamal signing keys.
People also translate
Nov 2005 DSA-888 openssl- cryptographic weakness.
As a result, cryptographic key material may be guessable.
SSL is the most widely used and most successful cryptographic system.
Software token for cryptographic authentication.
Cryptographic processes for a safety-relevant system have been implemented for the first time in the latest brake system, the MK C1.
We are a big Swiss cryptographic company.
Use of cryptographic means without the given licence is a crime.
Support of standard PKCS 11 for access to chip card Cryptographic Token Interface Standard.
As a result, cryptographic key material may be guessable.
All communication is end to end encrypted, and even the end points("destinations")are cryptographic identifiers essentially a pair of public keys.
The main aim of Cryptographic Locker is to extort as much money as possible;
The core of every CmDongle is a smart card chip,which includes a microcontroller with a secure storage area for cryptographic keys and the firmware.
Authentication: strong cryptographic material is essential in the use of HSMs.
Although you can only access instance metadata and user data from within the instance itself,the data is not protected by cryptographic methods.
Information technology, cryptographic protection of the information.
New cryptographic methods make it possible to treat sensitive data confidentially by revealing only the minimum necessary information to the other party.
SecurityServer Se Gen2 from Utimaco secures cryptographic key material for servers and applications.
The related cryptographic keys are stored inside a Hardware Security Module(HSM) for maximum security.
Secure Sockets Layer(SSL) and Transport Layer Security(TLS) are cryptographic protocols that provide communication security over a computer network.
The related cryptographic keys are stored inside an HSM for maximum security.
Overcoming this barrier required a comprehensive knowledge of mathematics, tremendous cryptographic skills and a consummate knowledge of the German language.
Microsoft Enhanced RSA and AES Cryptographic Provider or Microsoft Software Key Storage Provider for both the RA certificate and the user certificates' private keys.
True random number generation(RNG) is essential, on the one hand,for generating cryptographic keys used in encryption, authentication and signing processes.
The efficiency of this cryptographic virus was huge, and it was due several things.
MORCHEM SA uses information security techniques as generally accepted in business, such as firewalls,access control procedures and cryptographic mechanisms, all for the purpose of avoiding non-authorized data access.