cryptography oor Spaans

cryptography

/kɹɪpˈtɒɡ.ɹə.fi/, [kɹ̥ɪpˈthɒɡɹəfiː] naamwoord
en
The discipline concerned with communication security (eg, confidentiality of messages, integrity of messages, sender authentication, non-repudiation of messages, and many other related issues), regardless of the used medium such as pencil and paper or computers.

Vertalings in die woordeboek Engels - Spaans

criptografía

naamwoordvroulike
en
discipline concerned with communication security
What is quantum cryptography?
¿Qué es la criptografía cuántica?
en.wiktionary.org

codificación

naamwoordvroulike
He said: 'Incompatible national solutions in the field of cryptography create impediments that lessen the benefits of the internal market.
Afirmó que: Soluciones nacionales incompatibles en el campo de la codificación crean impedimentos que merman los beneficios del mercado interior.
Open Multilingual Wordnet

cifra

naamwoordvroulike
That is why a Community policy framework for cryptography is urgently needed.
Es por lo que necesitamos con urgencia un marco político comunitario para el cifrado.
Open Multilingual Wordnet

En 3 vertalings meer. Besonderhede is ter wille van die beknoptheid verborge

cryptografía · esteganografía · criptoanálisis

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

Cryptography

Vertalings in die woordeboek Engels - Spaans

Geen vertalings nie

Soortgelyke frases

history of cryptography
historia de la criptografía
public-key cryptography
Criptografía asimétrica · criptografía asimétrica · criptografía de clave asimétrica · criptografía de clave pública · criptografía de claves públicas
quantum cryptography
criptografía cuántica
Java Cryptography Architecture
Java Cryptography Architecture
dual-key cryptography
criptografía de doble clave
Cryptography Application Programming Interface
Interfaz de programación de aplicaciones criptográficas
elliptic curve cryptography
Criptografía de curva elíptica · criptografía de curva elíptica
secret-key cryptography
criptografía simétrica
public key cryptography
criptografía asimétrica · criptografía de clave asimétrica · criptografía de clave pública · criptografía de claves públicas

voorbeelde

Advanced filtering
Voorbeelde moet herlaai word.
Portable or mobile radiotelephones and similar client wireless devices for civil use, that implement only published or commercial cryptographic standards (except for anti-piracy functions, which may be non-published) and also meet the provisions of paragraphs b. to d. of the Cryptography Note (Note 3 in Category 5 - Part 2), that have been customised for a specific civil industry application with features that do not affect the cryptographic functionality of these original non-customised devices;
Marca o signo invocados en oposición: la marca denominativa alemana SHE para productos de las clases # y #, la marca figurativa alemana She para productos de las clases #, #, #, # y #, y la marca figurativa internacional She para productos de las clases #, #, #, # yEurLex-2 EurLex-2
In particular, it was suggested that the references to cryptography as used for confidentiality purposes and to interoperability of encryption systems should be deleted.
Se acabó, y la verdad tambiénUN-2 UN-2
Offline data authentication is a cryptographic check to validate the card using public-key cryptography.
Despídete, KarlWikiMatrix WikiMatrix
The invention of the computer represented a breakthrough in cryptography, since its power made it possible to use increasingly complex systems.
Aprovechemos al máximo esta sociedadnot-set not-set
The field was born with the observation that public-key cryptography can be used to break the symmetry between what an antivirus analyst sees regarding malware and what the attacker sees.
Los tenía para Riv er Glen.- ¿ Qué pasó?WikiMatrix WikiMatrix
e) financing surveys, studies, workshops in the area of network and information security (e.g. security mechanisms and their interoperability, network reliability and protection, advanced cryptography, privacy and security in wireless communications), in particular on existing or emerging threats and also with the view to prepare the activities of the networks security task-force;
¿ Quién había tosido?not-set not-set
“In Illinois, he learned the nuts and bolts of cryptography,” my mother said.
La levantaba, la acariciabaLiterature Literature
Consequently, some governments restrict or forbid the use or export of cryptography.
Y ahora a trabajarLiterature Literature
While the Working Group acknowledged that, particularly in the context of asymmetric cryptography, the signature-creation data (i.e. the private key) was distinct from the signature-verification data (i.e. the public key), it was generally found that draft articles 8 to 10 referred only to those confidential data used for the creation of the electronic signature.
Oh, amada tierraUN-2 UN-2
Gathering initial reactions from the cryptography community, WIRED’s Lily Hay Newman writes that the change could “unlock an even richer and more nuanced user data trove for Facebook to mine, and potentially make it harder to use one or more of the services without tying those profiles to a central identity.”
Yo no quiero ser quien escoja el sofá nuevogv2019 gv2019
“You’re applying the principles of sixteenth-century cryptography to a pre-Christian text.”
Perdon Papa, fue un accidenteLiterature Literature
A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography.
El recuerdo de todo esoWikiMatrix WikiMatrix
Required components for NSA Suite B Cryptography (RFC 6460) are: Advanced Encryption Standard (AES) with key sizes of 128 and 256 bits.
No le gusta nadaWikiMatrix WikiMatrix
In cryptography, it is used in cipher design (see Decorrelation theory) and in the design of hardware random number generators.
Como si te interesaraWikiMatrix WikiMatrix
In particular, it was suggested that the references to cryptography as used for confidentiality purposes and to interoperability of encryption systems should be deleted
Israel dejará de existirMultiUn MultiUn
In this segment I wanna show you how RSA is used in practice and in particular, I wanna tell you about a standard called a Public Key Cryptography standard number one PKCS one.
Es un pedazo de mierdaQED QED
Advances in cryptography and steganography also enabled individuals to conceal their identities online or to impersonate other users
En la cima de las montañas, una mesetaMultiUn MultiUn
Cryptography had no luck.
¿ Qué podemos hacer?OpenSubtitles2018.v3 OpenSubtitles2018.v3
This is called public key cryptography.
Con Joe Mattheson por favorLiterature Literature
Designed or modified to use "cryptography" employing digital techniques performing any cryptographic function other than authentication or digital signature and having any of the following:
ConfidencialidadEurLex-2 EurLex-2
define the cryptography which requires governmental approval;
¿ Qué piensan de la idea de tener la casa para ustedes solospor un dia o dos?EurLex-2 EurLex-2
This link explains the about-turn in US or French policy on cryptography.
Cada vez que comience un nuevo ciclo de tratamiento, se analizará su sangre para verificar si se debe ajustar su dosis de Temodalnot-set not-set
"Quantum cryptography" is also known as quantum key distribution (QKD).
Un fin que alcanzaremosEurLex-2 EurLex-2
Cryptography, and its misuse, were involved in the execution of Mata Hari and in Dreyfus' conviction and imprisonment, both in the early 20th century.
La verdad es que, a veces...... me da un poco de miedoWikiMatrix WikiMatrix
Cryptography plugin will export keys for the chosen meta-contacts. If no address book entry has been linked to each meta-contact, one will be created
Conway Twill,... eres un buen pistolero,... pero procura mantener esa maldita boca cerradaKDE40.1 KDE40.1
208 sinne gevind in 8 ms. Hulle kom uit baie bronne en word nie nagegaan nie.