Examples of using Public-key cryptography in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
Feistel ciphers. Public-key cryptography.
Security is ensured through the use of nearly impervious public-key cryptography.
The concept of public-key cryptography was introduced in 1976 by Whitfield Diffie and Martin Hellman.
Two of the best-known uses of public-key cryptography are.
It uses public-key cryptography to authenticate the remote computer and(optionally) to allow the remote computer to authenticate the user.
Gpg4win Encrypt emails and files using public-key cryptography.
In a public-key cryptography system(unlike secret-key systems), the sender and the
The RSA algorithm is widely used in public-key cryptography.
With the expiration of the basic patents on public-key cryptography and the widespread use of laptop computers running SSH
Documents may also be encrypted without using public-key cryptography.
Elliptic curve cryptography(ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
Select this option if the certificate is signed by using the RSA public-key cryptography algorithm.
Public-key cryptography is a cryptographic approach,
The RSA algorithm is widely used in public-key cryptography.
There was some criticism from various parties, including from public-key cryptography pioneers Martin Hellman and Whitfield Diffie,
P7S emails are encrypted using the cryptographic protocol Public-Key Cryptography Standard(PKCS).
SE based on secret-key(or symmetric-key) cryptography, and SE based on public-key cryptography.
Check-out and check-in of source code is authenticated with public-key cryptography to provide both access control and non-repudiation.
more commonly termed public-key cryptography.
work on digital signature technologies which employ public-key cryptography, a Directive at the European level should be technology-neutral.
recognition of Ralph Merkle's contribution to the invention of public-key cryptography(Hellman, 2002).
Authentication is implemented through industry-standard and application-efficient elliptic-curve, public-key cryptography to protect patients against the risks associated with non-qualified counterfeit devices
and authentication(using public-key cryptography).
work on digital signature technologies which employ public-key cryptography, a Directive at the European level should be technology-neutral
which would include digital signatures based on public-key cryptography as well as other means of authenticating data.
be used to"break" the widely used public-key cryptography scheme known as RSA.
whereas however,“digital signatures” based on public-key cryptography are currently the most recognised form of an electronic signature;
are open to authentication mechanisms other than public-key cryptography, as it is quite possible that new systems will emerge;