Examples of using Cryptographic algorithms in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Beecrypt-- Open source C library of cryptographic algorithms.
Supports multiple cryptographic algorithms such as AES, Blowfish, and 3DES.
Dash uses not one, but a combination of several cryptographic algorithms.
These cryptographic algorithms are provided for backward compatibility only.
Dash uses not one, but multiple cryptographic algorithms in combination;
These cryptographic algorithms are provided for backward compatibility only.
Such systems almost always use symmetric key cryptographic algorithms.
These cryptographic algorithms are provided for backward compatibility only.
This has bearing on the design of provably unbreakable cryptographic algorithms.
These cryptographic algorithms are provided for backward compatibility only.
VPN tunnel's security is guaranteed by the use of the strongest cryptographic algorithms.
Beecrypt: open source C library of cryptographic algorithms(package info), orphaned since 1764 days.
PDF files can be protected from opening with a range of cryptographic algorithms.
Use existing cryptographic algorithms, such as the implementations of AES and RSA provided in the Cipher class.
The Secure Hash Algorithm(SHA) is one of the most commonly employed cryptographic algorithms.
Also for added security are added new cryptographic algorithms for the latest version of a WebCrypto API.
Android 9 introduces several changes to the implementation and handling of cryptographic algorithms.
Some provide stronger cryptographic algorithms, while others use hardware components, such as smart cards.
Other uses===The Feistel construction is also used in cryptographic algorithms other than block ciphers.
Supplier will use cryptographic algorithms that have been published and evaluated by the general cryptographic community.
If you find that you need to implement your own protocol,you shouldn't implement your own cryptographic algorithms.
The policy details, such as which set of cryptographic algorithms was used, can be viewed in the IKE Policy item.
Both apps use the Signal encryption protocol,which is based on open, well-tested cryptographic algorithms.
Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks.
In addition to version 2 template features and autoenrollment,version 3 certificate templates provide support for Suite B cryptographic algorithms.
This document describes the conventions for using several cryptographic algorithms with the Cryptographic Message Syntax CMS.
One important benefit from PAdES is that electronically signed documents can remain valid for long periods, even if underlying cryptographic algorithms are broken.
In cryptography, the avalanche effect refers to a desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions.
There are many cryptographic algorithms in use nowadays, such as des, 3des, aes and rsa, most of these implemented in software; accordingly they have low performance; and can provide only low security levels.
All payments can be made without reliance on a third party andthe whole system is protected by heavily peer-reviewed cryptographic algorithms like those used for online banking.