public-key cryptography oor Spaans

public-key cryptography

naamwoord
en
A form of cryptography which allows users to communicate securely without previously agreeing on a shared secret key (abbreviation PKC)

Vertalings in die woordeboek Engels - Spaans

criptografía asimétrica

Termium

criptografía de clave pública

Termium

Criptografía asimétrica

en
cryptographic system requiring two separate keys, one of which is secret and one of which is public
wikidata

criptografía de clave asimétrica

Termium

criptografía de claves públicas

Termium

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

Soortgelyke frases

public key cryptography
criptografía asimétrica · criptografía de clave asimétrica · criptografía de clave pública · criptografía de claves públicas

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
Offline data authentication is a cryptographic check to validate the card using public-key cryptography.
Pero no me atrevo a decírseloWikiMatrix WikiMatrix
This is called public key cryptography.
Los bienes incluidos en el presente anexo pueden ser nuevos o usadosLiterature Literature
The secret key in a → Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.
Somos amigosCommon crawl Common crawl
This is one of the weak points of public key cryptography.
Gracias, maestraCommon crawl Common crawl
Electronic signatures relying on techniques other than public-key cryptography
Mira, yo olvidaría intentar verla en horas no hábilesUN-2 UN-2
DNSSEC works by digitally signing records for DNS lookup using public-key cryptography.
pueden alterarse acausa de un único fin?WikiMatrix WikiMatrix
This system of asymmetric cryptography, known as RSA, is said to be a form of public key cryptography.
Esto produce la apertura de los canales del cloro en la unión postsináptica, la entrada de iones cloruro y la inducción de un estado de reposo irreversibleLiterature Literature
A more sophisticated use of public key cryptography can achieve authentication, nonrepudiation, and integrity.
¿ Me preguntaste si estaba sentado en algo explosivo?Literature Literature
The Needham–Schroeder Public-Key Protocol, based on public-key cryptography.
InspeccionesWikiMatrix WikiMatrix
Access controls based on public key cryptography e.g. ssh.
¡ Di las malditas palabras!WikiMatrix WikiMatrix
We saw that public key cryptography is crucial for both PGP and SSL.
Vas a hacer que te demandeLiterature Literature
Public Key Cryptography - the diagram of coding, which does not require confidential channel for establishing the confidential connection.
Sí, pero me encanta hacerloCommon crawl Common crawl
When factoring numbers becomes easy to do, public-key cryptography becomes useless.
Tal vez no se verá afectadaLiterature Literature
Digital signatures relying on public-key cryptography
Luego, de repente, empieza a decir cuánto quería a su esposa...... y cómo se prendó de ella, como las vacas de MichiganUN-2 UN-2
Fortunately, public-key cryptography can make an important contribution in this area.
Escúchela y dígame lo que piensa, ¿ sí?Literature Literature
Key tampering is a major security weakness with public-key cryptography.
Según el Libro Verde de la Comisión Europea, este porcentaje aumentará hasta un # % enCommon crawl Common crawl
Alice wants to communicate with Bob, using public-key cryptography.
Pensé en un cierto estilo, ingenio...... imaginaciónLiterature Literature
A natural protocol that uses public key cryptography is: 1.
¿ Puedes confirmar que Heller... se lanzó en coche al lago?Literature Literature
Public key cryptography of data in computer networks
Ciertos años, teníamos un cerdo en la casa de guardavíatmClass tmClass
Hardware based "Montgomery multiplier" supporting key sizes up to 32K for public-key cryptography.
He estado pensando mucho acerca de tiWikiMatrix WikiMatrix
The use of public key cryptography is thus conceptually simple.
¿ Qué haréis cuando pierda la última partede mí?Literature Literature
And a bunch of people have tried to develop public-key cryptography systems using them.""
¿ Cómo pudiste hacerlo?Literature Literature
So we naturally consider an alternative approach—public key cryptography (using, for example, RSA).
Un # %, por el bien de mis hijosLiterature Literature
Independently of each other, Neal Koblitz and Victor Miller proposed using elliptic curves for public key cryptography.
Yo haré el informeCommon crawl Common crawl
Public key cryptography is based on the idea of irreversible mathematical functions.
¿ Acaso no lo sabe?Literature Literature
521 sinne gevind in 22 ms. Hulle kom uit baie bronne en word nie nagegaan nie.