Examples of using Cryptographic keys in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Renews your cryptographic keys.
Cryptographic keys are a core component of efficient information security.
Import and export of cryptographic keys.
Contains cryptographic keys for signing data only.
The card can securely save cryptographic keys.
Contains cryptographic keys for encryption and decryption.
Record all important values for the customer in the system e.g. cryptographic keys.
How are passwords and cryptographic keys protected within the software?
The related cryptographic keys are stored inside an HSM for maximum security.
We require such personnel to have unique IDs and associated cryptographic keys.
It is a fact that cryptographic keys are indispensable in the digital world.
The same flaw might occur during processing certain DER(Distinguished Encoding Rules)encoded cryptographic keys.
A Hardware Security Module(HSM) creates and secures cryptographic keys, and manages them for strong authentication.
The related cryptographic keys are stored inside a Hardware Security Module(HSM) for maximum security.
The most secure way to enable applications based on cryptographic keys is through the use of Hardware Security Modules HSMs.
Cryptographic keys, e.g. used for authentication in OPC UA, are stored and used securely on CmDongles.
A cache timing attack that could allow amalicious local user to gain portions of cryptographic keys.
In addition, export all cryptographic keys that are stored on the server before you use the wizard to delete the domain.
Applications such as authentication,electronic signatures and encryption require strong and securely managed cryptographic keys.
The heart of Volksverschlüsselung is a software which installs the cryptographic keys at the right locations on the user's computer.
HSMs offer the highest level of securitywhen generating, storing, managing and decommissioning high-quality cryptographic keys.
To keep them secure,all connections are underpinned by basic cybersecurity measures comprising cryptographic keys and digital certificates that must be tracked and protected.
When you renew the cryptographic keys for your computer, any messages that were encrypted with the previous public keys cannot be read.
True random number generation(RNG) is essential, on the one hand,for generating cryptographic keys used in encryption, authentication and signing processes.
The core of every CmDongle is a smart card chip,which includes a microcontroller with a secure storage area for cryptographic keys and the firmware.
Computers that incorporate a TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the TPM.
The main mechanisms for securing data, documents,identities or code while in transit and at rest are enabled by cryptographic keys or functions.
Promising research areas for PHYSEC technology include the diversification of cryptographic keys, post-quantum resistance, protection from relay attacks and integrity protection.
Pursuant to section 2 of the German Act on Digital Signature, unique electronic data,such as private cryptographic keys, which is used to create an electronic signature.