Examples of using Encryption algorithms in English and their translations into Romanian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
Powerful encryption algorithms.
CBC is a powerful mode of using the encryption algorithms.
A set of encryption algorithms.
Encryption algorithms used in popular kriptovalyutnyh systems.
Support for various encryption algorithms.
His encryption algorithms are beyond the beyond the beyond.
Time-tested and trusted encryption algorithms.
Reliable encryption algorithms protect sensitive data when working in the global network.
Select the check box beside one or more encryption algorithms.
Change the encryption algorithms for S/MIME or PGP protected messages| Porsche Design P 9981 from BlackBerry.
Security F1F1 uses enterprise level encryption algorithms, including AES and RSA.
Lavasoft Digital Lock helps to protect important data using different encryption algorithms.
(Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.).
Secret PDF enforces DRM controls with AES, random encryption algorithms and public key technology.
Encryption algorithms that can be used in kriptovalyutnyh systems, there are more than a hundred today.
The software allows the user to ensure the safety of the network,using various encryption algorithms.
One way is to sabotage encryption algorithms, which is a great example about how U.S. intelligence agencies are running loose.
The sensitive data is encrypted all the time using the U.S. government approved encryption algorithms.
A wide variety of encryption algorithms are supported including AES(Advanced Encryption Standard) and TDES ciphers.
PassGator uses the industry most advanced and secure encryption algorithms to protect your passwords.
TrueCrypt allows you to encrypt all data, including the content of each file andfree space using different encryption algorithms.
The database is encrypted andpassword protected and the encryption algorithms used are almost impossible to crack.
All your Password Items are already encrypted using your login credential with military-grade encryption algorithms.
Free File Encrypter uses different encryption algorithms, allows encryption of files and provides decryption options.
Using Cryptbox you can encrypt or hide sensitive data on your computer,the program uses different encryption algorithms.
Using elliptic curve cryptography encryption algorithms(ECC), it meets the Suite B standards approved by the U.S. Government.
And we did not know that U.S. intelligence agencies go to extremes such as infiltrating standardization bodies to sabotage encryption algorithms on purpose.
By using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors.
With Adolix Computer Security can encrypt and hide sensitive data from your computer,the program uses different encryption algorithms.
Sticky Password incorporates the industry's most powerful encryption algorithms and provides effective protection against phishing schemes, concealed key-loggers and identity theft.