public key cryptography oor Spaans

public key cryptography

naamwoord
en
The subfield of cryptography in which all information used to encode a message is assumed to be publicly available.

Vertalings in die woordeboek Engels - Spaans

criptografía de clave pública

Termium

criptografía asimétrica

Termium

criptografía de clave asimétrica

Termium

criptografía de claves públicas

Termium

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
Offline data authentication is a cryptographic check to validate the card using public-key cryptography.
Una reputación impecable e íntimo amigo delpresidente... recientemente confirmado en la oficina de Política de Control de Drogas... nuestro nuevo zar contra las drogas, RobertHudson WakefieldWikiMatrix WikiMatrix
This is called public key cryptography.
Tengo que encontrar un cajeroLiterature Literature
The secret key in a → Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.
Voy a llamar al equipo de limpiezaCommon crawl Common crawl
This is one of the weak points of public key cryptography.
Quedémonos aquí.No soy de las cosas antiguasCommon crawl Common crawl
Electronic signatures relying on techniques other than public-key cryptography
? Por quì no le saludas?UN-2 UN-2
DNSSEC works by digitally signing records for DNS lookup using public-key cryptography.
La ociosidad es el padre de todos los vicios, y yo soy el hijo de la ociosidadWikiMatrix WikiMatrix
This system of asymmetric cryptography, known as RSA, is said to be a form of public key cryptography.
Es muy raro, no, como tu cuerpo lo haceLiterature Literature
A more sophisticated use of public key cryptography can achieve authentication, nonrepudiation, and integrity.
Si sólo tienes una estrategia en Survivor... tus opciones para llegar hasta la final se reducenLiterature Literature
The Needham–Schroeder Public-Key Protocol, based on public-key cryptography.
Creo que lo podré arreglarWikiMatrix WikiMatrix
Access controls based on public key cryptography e.g. ssh.
Todo esto no es mas que una farsa, DannyWikiMatrix WikiMatrix
We saw that public key cryptography is crucial for both PGP and SSL.
¿ No estaba aburrida en la granja con esas ovejas?Literature Literature
Public Key Cryptography - the diagram of coding, which does not require confidential channel for establishing the confidential connection.
No recuerda nadaCommon crawl Common crawl
When factoring numbers becomes easy to do, public-key cryptography becomes useless.
Cuando se enteró que haríamos despedir a Ned Flanders, insistió en ayudarLiterature Literature
Digital signatures relying on public-key cryptography
Gracias, doctor, he vuelto a nacerUN-2 UN-2
Fortunately, public-key cryptography can make an important contribution in this area.
Que traten bien a estos dosLiterature Literature
Key tampering is a major security weakness with public-key cryptography.
Sí.Este brazo del rotorCommon crawl Common crawl
Alice wants to communicate with Bob, using public-key cryptography.
Estoy pintando mi estudio.¿ Vas a alquilarlo?Literature Literature
A natural protocol that uses public key cryptography is: 1.
¿ Por qué no te pones las gafas de sol?Literature Literature
Public key cryptography of data in computer networks
Ya me ocupo yotmClass tmClass
Hardware based "Montgomery multiplier" supporting key sizes up to 32K for public-key cryptography.
Así me gano la vidaWikiMatrix WikiMatrix
The use of public key cryptography is thus conceptually simple.
Raíces de ginsengLiterature Literature
And a bunch of people have tried to develop public-key cryptography systems using them.""
Así que vas a sufrir tal y como sufrí yoLiterature Literature
So we naturally consider an alternative approach—public key cryptography (using, for example, RSA).
¿ me oyen?¿ Dónde están?Literature Literature
Independently of each other, Neal Koblitz and Victor Miller proposed using elliptic curves for public key cryptography.
Todos nosotros salimosCommon crawl Common crawl
Public key cryptography is based on the idea of irreversible mathematical functions.
David Lilly!David LillyLiterature Literature
521 sinne gevind in 14 ms. Hulle kom uit baie bronne en word nie nagegaan nie.