Examples of using Cryptographically in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
If key material is cryptographically obsolete.
After cryptographically verifying the checksum files, we can check that.
Random number generation that is cryptographically secure and FIPS-validated.
The result is a decentralised,publicly and distributed account book that is cryptographically secured.
Device random Entropy device Cryptographically secure random number generator.
Contrary to the digital signature, MD5 checksums are cryptographically weak.
These subnets are each cryptographically distinct and secure from the others.
No individual or organization can control or manipulate the Bitcoin protocol because it is cryptographically secure.
Each block is cryptographically hashed, and must include the hash of the previous block.
Portsnap fetches snapshots and updates over http, and then cryptographically verifies the downloaded files.
Aristotle mentions cryptographically that"anyone who wanted to describe a" Dog"could use" Dog Star.
The Cryptographic Message Syntax(CMS) is the IETF's standard for cryptographically protected messages.
They are cryptographically trusted by your operating system or browser, and issue and sign certificates for websites.
The receiver responds only to authorized and cryptographically secured signals that are actually relevant for it.
The secure APT system verifies the integrity of the downloaded top level"Release" file cryptographically by this"Release.
Trusted Tag Services', on the other hand,creates a unique cryptographically secure URL and leverages strong authentication with every smartphone tap.
If there is a concerted effort to develop quantum computing, I believe we have a number of yearsbefore it reaches maturity- what we refer to as being cryptographically relevant.”.
Any organisational forms can be cryptographically depicted hierarchically and/or overlapping thanks to the multi-domain capability i. e.
The CA condenses the certificate by running it through a one-way hashing algorithm,then cryptographically“signs” that condensed version of the certificate.
If AVS offers cryptographically secured services, the client is obliged to use these services only if that does not violate any acts applied to the client.
The SSL version 3 andTLS protocols support session renegotiation without cryptographically tying the new session parameters to the old parameters.
The cryptID, on the other hand, is always cryptographically secured and is guaranteed to belong to the user U. The cryptID is comparable to a digital DNA that originates from the(unknown) user U. U does not need to remember or enter his cryptID.
These libraries provide basic functions thatautomatically take care of tasks such as cryptographically signing your requests, retrying requests, and handling error responses.
SkIDentity in particular allows to derive cryptographically protected"Cloud Identities" from any eID document, which can be transmitted to any smartphone and used there for the strong pseudonymous authentication or a self-determined identity proofing in the cloud.
An X. 509 certificate consists primarily of a public key that corresponds to your private server key,and a signature by the CA that is cryptographically tied to the public key.
For example, you can use the SDKs to sign requests cryptographically, manage errors, and retry requests automatically.
Moreover, SkIDentity allows to derive cryptographically secured"Cloud Identities" from any standard compliant eID card, which can be transferred to almost any smartphone in order to be used for pseudonymous authentication or a self-determined proof of identity in the cloud.
The security mechanisms within the software produced by the project MUST generate all cryptographic keys and nonces using a cryptographically secure random number generator, and MUST NOT do so using generators that are cryptographically insecure.
The transmission of the version information via DNS is not cryptographically secured and can therefore be disrupted easily compared to the communication with the update servers of Intra2net, which is completely secured by HTTPS.
The ID token is a JSON web token, which may contain cryptographically secured information about the user, such as a unique ID, name, address, or e-mail address.