Examples of using Cryptographic algorithms in English and their translations into Russian
{-}
-
Official
-
Colloquial
Cryptographic algorithms.
DPAPI uses proven cryptographic algorithms.
Strong cryptographic algorithms are employed to protect data in VIPole.
Annex C(normative): Cryptographic algorithms 22.
VPN tunnel's security is guaranteed by the use of the strongest cryptographic algorithms.
VIPole uses strong cryptographic algorithms for data protection.
It encrypts andsecures users' traffic by employing high-level cryptographic algorithms and keys.
The cryptographic algorithms of Kaliski et al. may also be viewed as attempting to infer the structure of an unknown group.
This one-way function behavior makes modular exponentiation a candidate for use in cryptographic algorithms.
The policy details,such as which set of cryptographic algorithms was used, can be viewed in the IKE Policy item.
Kleptographic attacks have been designed for RSA key generation, the Diffie-Hellman key exchange,the Digital Signature Algorithm, and other cryptographic algorithms and protocols.
Some provide stronger cryptographic algorithms, while others use hardware components, such as smart cards.
Each security method determines the security protocol(such as AH or ESP), the cryptographic algorithms, and session key regeneration settings used.
Supplier will use cryptographic algorithms that have been published and evaluated by the general cryptographic community.
In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms.
Neither Zcash nor any other cryptographic algorithms or software we have made contains a backdoor, and they never will.
Kleptography, a subfield of cryptovirology, is the study of asymmetric back doors in key generation algorithms, digital signature algorithms, key exchanges, pseudorandom number generators, encryption algorithms, and other cryptographic algorithms.
Has been proposed demonstrate cryptographic algorithms with accompaniment of animated flash-presentations based on CrypTool 1.
Cryptographic Algorithms for the x86 version are implemented in Assembly Language, and the implementation has maximum number of optimizations for the Intel Core i5-i7 processors, while still performing sufficiently fast on any other processors as well.
Suite B was created by the U.S. National Security Agency to specify cryptographic algorithms that must be used by U.S. government agencies to secure confidential information.
These games use cryptographic algorithms that can then be verified after a bet to ensure that the results of each spin, hand, or roll of the dice were legitimately arrived at through a random process.
Three groups of RLWE cryptographic algorithms exist: The fundamental idea of using LWE and Ring LWE for key exchange was proposed and filed at the University of Cincinnati in 2011 by Jintai Ding.
Blockchain uses isolated distributed data storage, point-to-point information transfer(P2P) technology,consensus mechanism, cryptographic algorithms and other technologies and ideally resolves any issues of trust between people, at the same time, thanks to encrypted(cryptographic) algorithms, it ensures the confidentiality and security of transactions between people.
In it, two sets of AI's devised their own cryptographic algorithms to protect their communications from another AI, which at the same time aimed at evolving its own system to crack the AI-generated encryption.
This value is important when designing cryptographic algorithms, as it can be used to determine the minimum size of encryption keys or hash values required to create an algorithm that could never be cracked by a brute-force search.
I have tried every cryptographic algorithm there is.
Key words: primitive binary matrices, a cryptographic algorithm, data encryption.
Ransomware encrypts the AES key through asymmetric cryptographic algorithm RSA-2048.
LUCIFER: a cryptographic algorithm.