What is the translation of " CRYPTOGRAPHY " in English?

Examples of using Cryptography in Spanish and their translations into English

{-}
  • Official category close
  • Colloquial category close
El auténtico artífice de este programa es EJC Cryptography.
This software is a product of EJC Cryptography.
Cryptography, hash functions, BLAKE2| Ver todos los tags.
Cryptography, hash functions, BLAKE2| View all tags.
Handbook of applied cryptography(en inglés)(quinta edición). pp. 138.
Handbook of Applied Cryptography(Fifth ed.). pp.
La tarjeta inteligente rápida no es compatible con Cryptography Next Generation.
Fast smart card doesn't support Cryptography Next Generation.
Introduction to Cryptography with Coding Theory Second edición.
Introduction to Cryptography with Coding Theory Second ed.
Publicado por jinza en Criptografía cuántica,Quantum cryptography| Comments off.
Posted by jinza in Criptografía cuántica,Quantum cryptography| Comments off.
Cryptography Studio- Cifrar sus archivos utilizando diferentes métodos de cifrado.
Cryptography Studio- Encrypt your files using different encryption methods.
The code book: the science of secrecy from ancient Egypt to quantum cryptography en inglés.
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.
Fue desarrollado por Cryptography Research Inc. y está basado en el concepto Self-Protecting Digital Content(SPDC) desarrollado por la misma empresa.
It was developed by Cryptography Research Inc. and is based on their Self-Protecting Digital Content concept.
Seleccione la longitud en bits(2048) y sidesea utilizar SGC(Server Gated Cryptography).
Select the Bit Length(2048) andwhether you want to use SGC(Server Gated Cryptography).
En 1976 se hizo público el artículo New Directions in Cryptography, de Whitfield Diffie y Martin Hellman.
This was the publication of the paper New Directions in Cryptography by Whitfield Diffie and Martin Hellman.
Para obtener más información sobre la criptografía,te recomendamos consultar Introduction to Modern Cryptography.
For more information on cryptography,a good resource is an Introduction to Modern Cryptography.
La plataforma también admite cifrado a través de la Java Cryptography Extension(JCE) con la API de Bouncy Castle Crypto.
The platform also provides cryptographic support through the Java Cryptography Extension(JCE) with the Bouncy Castle Crypto API.
Dispone de CAs root vinculadas que combinan criptografía RSA ycriptografía ECC(Elliptic curve cryptography).
It manages two root CAs linked together, combining RSA cryptography andECC(Elliptic curve cryptography).
Para obtener más información acerca de las interfaces y clases de motor del estándar JCA(Java Cryptography Architecture) admitidas por AWS CloudHSM, consulte los siguientes temas.
For information about the Java Cryptography Architecture(JCA) interfaces and engine classes supported by AWS CloudHSM, see the following topics.
Un diseño mejorado de estealgoritmo se llamó Fortuna, Ferguson y Schneier lo describen en su libro Practical Cryptography.
An improved design from Ferguson and Schneier, Fortuna,is described in their book, Practical Cryptography, and FreeBSD has now moved to using this.
On scaling decentralized blockchains”,International Financial Cryptography Association(IFCA), Conferencia Internacional de Criptografía en el Sector Financiero y Seguridad de los Datos.
On scaling decentralized blockchains”,International Financial Cryptography Association(IFCA), International Conference on Financial Cryptography and Data Security.
Parece haber una correlación que despierta interés entre la cryptography y steganography.
There seems to be a correlation arousing interest between cryptocurrency and steganography.
En 1976 publicó junto a Martin Hellman New Directions in Cryptography, que presentaba un nuevo método de distribución de claves criptográficas para solucionar uno de los problemas fundamentales de la criptografía: la distribución de la clave.
Diffie and Hellman's 1976 paper New Directions in Cryptography introduced a radically new method of distributing cryptographic keys, that helped solve key distribution-a fundamental problem in cryptography..
El estándar se amplió para dar soporte a Camellia(cipher) por RFC 5581 en 2009, yencriptado basado en elliptic curve cryptography(ECDSA, ECDH) por RFC 6637 en 2012.
The standard was extended to support Camellia cipher by RFC 5581 in 2009, and signing andkey exchange based on Elliptic Curve Cryptography(ECC)(i.e. ECDSA and ECDH) by RFC 6637 in 2012.
En marzo de 1997 la OCDE adoptó las Directrices para la política de criptografía(Guidelines for Cryptography Policy), que enuncian los principios que deben seguir los gobiernos al formular sus políticas sobre el uso de la criptografía.
In March 1997, the OECD adopted“Guidelines for Cryptography Policy” setting out principles to be followed by Governments in formulating their policies for the use of cryptography..
Usamos cifrados seguros con claves grandes, y usamos los algoritmos de cifrado por defecto de la industria de la seguridad, comose documenta en on the low-level cryptography page.
We use strong cryptography with long keys, and we assume the security of the industry-standard cryptographicprimitives used in I2P, as documented on the low-level cryptography page.
La charla de Gilles, titulada'Advances in computer-aided cryptography' ofrece una revisión de los últimos desarrollos en herramientas que tratan de automatizar el diseño, análisis e implementación de primitivas y protocolos criptograficos.
Gilles talk, entitled'Advances in computer-aided lcryptography' presented recent developments in computer-aided cryptography which aims to provide rigorous tools that ease the design, analyze and implement cryptographic primitives and protocols.
Results: 23, Time: 0.0252

How to use "cryptography" in a Spanish sentence

How Far Back Does Cryptography Date?
Gendou.com Forum: Other: Cryptography Challenge #17!
How does Public Key Cryptography work?
Cryptography Has Been "Broken"...Or Has It?
You Know About Cryptography and cipher?
Ross Anderson liveblogged Financial Cryptography 2014.
AdFind Cryptography Software and Related Articles.
LabManual for Cryptography and Network Security.
How Does Cryptography Work With Cryptocurrencies?
Cryptography Theory and Practice (2nd ed.

How to use "cryptography" in an English sentence

For the cryptography meaning, see Plaintext.
Forouzan.Behrouz Forouzan, Cryptography and Network Security.
Biometric Identity-Based Cryptography for e-Government Environment.
Ssh uses public-key cryptography for authentification.
Permissions, authentication, and cryptography algorithm understanding.
You Know About Cryptography and cipher?
Cryptology embraces both cryptography and cryptanalysis.
Bitcoins use Cryptography for security measures.
Why Does Public Key Cryptography Work?
Cryptography uses public and private keys.
Show more

Top dictionary queries

Spanish - English