asymmetric cryptosystem oor Spaans

asymmetric cryptosystem

Vertalings in die woordeboek Engels - Spaans

criptosistema asimétrico

Termium

criptosistema de clave pública

Termium

sistema criptográfico asimétrico

Termium

sistema de cifrado asimétrico

Termium

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
In 1979, Rabin invented the Rabin cryptosystem, the first asymmetric cryptosystem whose security was proved equivalent to the intractability of integer factorization.
En Éa zona circundante hay profundos desgarros... que se han cerrado con puntos de sutura quirurgicosWikiMatrix WikiMatrix
Computer equipment and software utilizing two such keys are often collectively referred to as “cryptosystems” or, more specifically, "asymmetric cryptosystems" where they rely on the use of asymmetric algorithms
Bien tranquilo, como si tu vida dependiera de elloMultiUn MultiUn
Computer equipment and software utilizing two such keys are often collectively referred to as “cryptosystems” or, more specifically, "asymmetric cryptosystems" where they rely on the use of asymmetric algorithms.
¿ Qué esperaba, teniente?UN-2 UN-2
Computer equipment and software utilizing two such keys are often collectively referred to as “cryptosystems” or, more specifically, "asymmetric cryptosystems" where they rely on the use of asymmetric algorithms.
Eso es un manicomio, Rud no irá allíUN-2 UN-2
Computer equipment and software utilizing two such keys are often collectively referred to as “cryptosystems” or, more specifically, “asymmetric cryptosystems” where they rely on the use of asymmetric algorithms.
Y yo creí que cambiarías si cambiaba yoUN-2 UN-2
Although the keys of the pair are mathematically related, if an asymmetric cryptosystem has been designed and implemented securely it is virtually infeasible to derive the private key from knowledge of the public key
TEXTOS APROBADOSMultiUn MultiUn
Although the keys of the pair are mathematically related, if an asymmetric cryptosystem has been designed and implemented securely it is virtually impossible to derive the private key from knowledge of the public key.
Sólo he visto su pósterUN-2 UN-2
Although the keys of the pair are mathematically related, if an asymmetric cryptosystem has been designed and implemented securely it is virtually impossible to derive the private key from knowledge of the public key.
Cúbrelos, hermano, cúbrelosUN-2 UN-2
Although the keys of the pair are mathematically related, if an asymmetric cryptosystem has been designed and implemented securely it is virtually infeasible to derive the private key from knowledge of the public key.
¿ No cree que deberíamos esperar?UN-2 UN-2
Although the keys of the pair are mathematically related, if an asymmetric cryptosystem has been designed and implemented securely it is virtually impossible to derive the private key from knowledge of the public key
Contraje la Cepa TTLV # en el brote delMultiUn MultiUn
Merkle–Hellman is an asymmetric-key cryptosystem, meaning that two keys are required for communication: a public key and a private key.
¿ Te vas a mover hijo de pWikiMatrix WikiMatrix
By the 1990s we had this asymmetric, two-key cryptosystem.
No hice tal cosa.- ¿ No?Literature Literature
The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization.
Comercialización de productos fitosanitarios *** IWikiMatrix WikiMatrix
For the purposes of this Decree, it is understood that the ASYMMETRIC CRYPTOSYSTEM must be TECHNICALLY TRUSTWORTHY.
¿ Estás segura del camino?ParaCrawl Corpus ParaCrawl Corpus
On the contrary, in asymmetric cryptosystems, the n public keys of the members are stored in a public directory.
Por tanto, el Órgano de Vigilancia de la AELC desea animar a los ciudadanos y empresas a que se dirijan a las autoridades de competencia para informarlas de las infracciones de la normativa de competencia de las que tengan sospechaParaCrawl Corpus ParaCrawl Corpus
Another distinguishing feature of asymmetric schemes is that, unlike attacks on symmetric cryptosystems, any cryptanalysis has the opportunity to make use of knowledge gained from the public key.
Ese es Kang, el propietarioWikiMatrix WikiMatrix
With asymmetric cryptosystems on the other hand, every partner in the communication generates their own pair of key: a public key and a private key.
Entonces, ¿ a qué estás esperando?ParaCrawl Corpus ParaCrawl Corpus
This is where asymmetrical cryptosystems have been implemented, which enable a secure exchange of symmetrical keys or work without the exchange of a common key.
Acabo de ir al laboratorioParaCrawl Corpus ParaCrawl Corpus
Public Key: A component of an asymmetric cryptosystem that suffices for parameterizing the encryption but does not suffice for feasibly deducing the decryption parameter, i.e., the...
Tendran que saltar. ¿ Cuales son sus probabilidades de sobrevivir?ParaCrawl Corpus ParaCrawl Corpus
Private Key: A component of an asymmetric cryptosystem that suffices for parameterizing the decryption and thus must be kept privately and usually also suffices for parameterizing the encryption;
Nos gusta tutear a los candidatos potencialesParaCrawl Corpus ParaCrawl Corpus
The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography.
Éste es un atracoWikiMatrix WikiMatrix
The private key stays a secret. This is the strength of the asymmetric cryptosystem: As opposed to in a symmetric encryption method, the secret key never leaves its owner’s sight.
Los Anexos I, # y # y el Protocolo sobre asistencia mutua entre las autoridades administrativas en cuestiones aduaneras formará parte integrante de este AcuerdoParaCrawl Corpus ParaCrawl Corpus
PGP is an Asymmetric cryptosystems (public key cryptosystems) because it uses one key (the public key) to encrypt a file (or message or text) and a different key (the private key) to decrypt it.
Un jugo de naranjaParaCrawl Corpus ParaCrawl Corpus
Merkle-Hellman is an asymmetric-key cryptosystem, meaning that two keys are required for communication: a public key and a private key.
¿ Conoce algún camino que llegue a Koker?ParaCrawl Corpus ParaCrawl Corpus
29 sinne gevind in 12 ms. Hulle kom uit baie bronne en word nie nagegaan nie.