asymmetric cryptography oor Spaans

asymmetric cryptography

naamwoord
en
cryptography in which the key used in decryption is different from that used for encryption.

Vertalings in die woordeboek Engels - Spaans

criptografía asimétrica

The vehicles under test originally deployed software-based asymmetric cryptography, but this proved slow and problematic.
Al principio, los vehículos de pruebas iban equipados con funciones de criptografía asimétrica proporcionada mediante software, pero se observó lentitud y otras deficiencias.
Termium

criptografía de clave asimétrica

Termium

criptografía de clave pública

Termium

criptografía de claves públicas

Termium

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
This system of asymmetric cryptography, known as RSA, is said to be a form of public key cryptography.
¿ Una investigación?- ¿ Qué?Literature Literature
Asymmetric cryptography
Nuestro papátransporta maderaEuroParl2021 EuroParl2021
An alternative to the use of shared secrets for authentication is the use of asymmetric cryptography.
Eso significa que tieneWikiMatrix WikiMatrix
Returning to padlock analogies, asymmetric cryptography can be thought of in the following way.
Visto el estudio Repercusiones del proyecto de Directiva sobre los servicios en el mercado interior en la recaudación fiscal y en los ingresos fiscales en los Estados miembros de la Unión Europea, realizado por el Instituto Austriaco de Economía a petición de la Dirección A (Dirección de Política Económica y Científica) de la Dirección General de Políticas Interiores de la Unión del Parlamento Europeo (Proyecto no IP/A/ECON/STLiterature Literature
The vehicles under test originally deployed software-based asymmetric cryptography, but this proved slow and problematic.
Dado que la decisión de la Comisión de no dar curso a una solicitud de certificado de exportación una vez cumplido el plazo de reflexión de tres días puede, no obstante, interrumpir, en algunos casos, la continuidad de los suministros de productos cuyo abastecimiento periódico es necesario, conviene ofrecer la posibilidad de obtener un certificado de exportación sin restitución a los operadores que lo soliciten, sin perjuicio de la imposición de condiciones específicas de utilizacióncordis cordis
Public Key - the open key, the non-secret part of the pair of two keys in asymmetric cryptography.
Hey escuche algo esta vez.- ¿ Que?Common crawl Common crawl
Verification of the authenticity of the data using an asymmetrical cryptography protocol transmitted in the signals and a public cryptographic key
Energías renovableseurlex-diff-2018-06-20 eurlex-diff-2018-06-20
This was the first time that hybrid encryption (combination of symmetric and asymmetric cryptography) was applied within a program popular (even today) by end users.
¡ Pero Maria puede hacerlo!Common crawl Common crawl
Given the pace of technological innovation, the Uniform Rules provide for the legal recognition of electronic signatures irrespective of the technology used (e.g., digital signatures relying on asymmetric cryptography, or biometrics).
Está bien.¡ Ojalá llevara mis zapatos viejos!UN-2 UN-2
Given the pace of technological innovation, the Uniform Rules provide for the legal recognition of electronic signatures irrespective of the technology used (e.g., digital signatures relying on asymmetric cryptography, or biometrics
¡ No enciende!MultiUn MultiUn
On the other hand, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as "linked to the signatory" is the cryptographic key pair.
Ninguna objeciónUN-2 UN-2
“On the other hand, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as ‘linked to the signatory’ is the cryptographic key pair.
Pero...¿ hay alguna novedad?UN-2 UN-2
On the other hand, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as "linked to the signatory" is the cryptographic key pair
ocuparse de las actividades de información, asesoramiento y difusión de los resultadosMultiUn MultiUn
For instance, latency-sensitive applications like Real-Time State Estimation of distribution grids (RTSE) can use fast symmetric cryptography, while smart metering can select stronger asymmetric cryptography for privacy-sensitive applications,’ says Dr Strobbe.
Eh, Moss, mira, soy una mujer... y te quiero, Moss, te quierocordis cordis
For example, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as “linked to the signatory and to no other person” was the cryptographic key pair
Llevé a mi grupo de estadounidenses enfermos a un Hospital cubano para ver si los podían atenderMultiUn MultiUn
For example, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as “linked to the signatory and to no other person” was the cryptographic key pair.
¡ Parece que usted es un gran tirador!UN-2 UN-2
For example, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as “linked to the signatory and to no other person” is the cryptographic key pair.
Duración del régimenUN-2 UN-2
For example, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as “linked to the signatory and to no other person” is the cryptographic key pair
La vida es duraMultiUn MultiUn
“Digital signature” is a name for technological applications using asymmetric cryptography, also referred to as public key encryption systems, to ensure the authenticity of electronic messages and guarantee the integrity of the contents of these messages
sido cambiadas a dinero en efectivo y desaparecerian por la tardeMultiUn MultiUn
“Digital signature” is a name for technological applications using asymmetric cryptography, also referred to as public key encryption systems, to ensure the authenticity of electronic messages and guarantee the integrity of the contents of these messages.
Cómo te has dado cuenta?UN-2 UN-2
However, it is at least questionable whether, from a legal point of view, the application of asymmetric cryptography for authentication purposes should be referred to as a digital “signature”, as its functions go beyond the typical functions of a handwritten signature.
Bueno, a veces juego a squashUN-2 UN-2
However, it is at least questionable whether, from a legal point of view, the application of asymmetric cryptography for authentication purposes should be referred to as a digital “signature”, as its functions go beyond the typical functions of a handwritten signature
ETIQUETA DE LA PLUMA OPTISETMultiUn MultiUn
Alternatively, passwords can be passed over the Internet, using cryptography (e.g. SSL in browsers) to protect them, in conjunction with the use of biometrics to trigger a digital signature (asymmetric cryptography), which, on receipt, generates a Kerberos ticket (symmetric cryptography
Se abrirá el diálogo de nombre de archivo y el usuario podrá elegir un nombre para el archivo de verbosMultiUn MultiUn
158 sinne gevind in 13 ms. Hulle kom uit baie bronne en word nie nagegaan nie.