asymmetric algorithm oor Sloweens

asymmetric algorithm

en
An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message.

Vertalings in die woordeboek Engels - Sloweens

asimetrični algoritem

en
An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message.
I've been assuming that the cipher text was encrypted with an asymmetric algorithm.
Domnevala sem, da je šifriran tekst zakodiran z asimetričnim algoritmom.
MicrosoftLanguagePortal

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
An "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Mislim, da je to bistvo tega vprašanja.EurLex-2 EurLex-2
b. an “asymmetric algorithm” where the security of the algorithm is based on any of the following:
Verjamemo, da je enako pomembno pripraviti dijake...... za uspešno parjenje in pravo vzgojo otrok.V to mi verjamemoEurLex-2 EurLex-2
b. an ‘asymmetric algorithm’ where the security of the algorithm is based on any of the following:
Komisija meni, da je v tej zadevi upravičena, da oceni, ali gre za državno pomoč z uporabo načela zasebnega upnikaEurLex-2 EurLex-2
b. An "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Živjo, jaz semEurLex-2 EurLex-2
An asymmetric algorithm key that's committed to memory.
Poleg tega želi, da to pravilo ne bi veljalo za ukrepe tehnične pomoči gospodarskim in socialnim partnerjem, da ne bi bila evropska pomoč vezana na državne pomočiOpenSubtitles2018.v3 OpenSubtitles2018.v3
N.B.: A common use of "asymmetric algorithms" is key management.
Dostopnost Skupnosti do instrumenta garancij za posojila ali drugega instrumenta za financiranje, vključno s provizijami za upravljanje in drugimi upravičenimi stroški, se omeji na višino prispevka Skupnosti navedenemu instrumentu, s čimer se odgovornost splošnega proračuna Evropske unije končaEurLex-2 EurLex-2
A common use of "asymmetric algorithms" is key management.
Osnovni operacijskii sistemEurLex-2 EurLex-2
Asymmetric algorithm means a cryptographic algorithm using different, mathematically-related keys for encryption and decryption
Morda bi se mu moral zahvalitioj4 oj4
b. an "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Donosnost naložb je na splošno ostala negativna in se je v obravnavanem obdobju zmanjšala za #,# odstotne točkeEurLex-2 EurLex-2
"Asymmetric algorithm" (5) means a cryptographic algorithm using different, mathematically-related keys for encryption and decryption.
o uvedbi začasne protidampinške dajatve na uvoz triklorizocianurne kisline s poreklom iz Ljudske republike Kitajske in Združenih držav AmerikeEurlex2019 Eurlex2019
An "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Okvira, ki ga zagotavljajo schengenski predpisi, ne uporabljajo pravilno.EurLex-2 EurLex-2
An ‘asymmetric algorithm’ where the security of the algorithm is based on any of the following:
Zaposlene osebeEurLex-2 EurLex-2
b. An "asymmetric algorithm" where the security of the algorithm is based on any of the following:
Povej mu, kje so kamniEurLex-2 EurLex-2
An “asymmetric algorithm” where the security of the algorithm is based on any of the following:
Glede neposredne vloge #,# % delnic WK v vrednosti # milijonov DEM v rezervo tihe družbe, prav tako #. januarja #, so se sicer dogovorile za temeljni pristop pri merilu za fiksno nadomestilo, ne pa za natančni izračun, zlasti glede odbitka zaradi nelikvidnosti (glej odstavke # doEurLex-2 EurLex-2
Asymmetric algorithm’ (5) means a cryptographic algorithm using different, mathematically-related keys for encryption and decryption.
Učinkovitost in varnost zdravila Thelin pri sočasnem jemanju drugih zdravil za zdravljenje PAH (npr. epoprostenol, sildenafil, iloprost) nista bili preučeni v kontroliranih kliničnih preskušanjihEurLex-2 EurLex-2
b. An ‘asymmetric algorithm’ where the security of the algorithm is based on any of the following:
S #. nadstropja?EurLex-2 EurLex-2
79 sinne gevind in 5 ms. Hulle kom uit baie bronne en word nie nagegaan nie.