Приклади вживання A public key Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
involves a pair of keys, namely a public key and a private key,
Sure, you can print out a bitcoin on a piece of paper, but having a paper with a QR code or a public key is not enough to relieve that sense of unease.
it becomes possible to hack cryptographic systems with a public key.
New post-quantum algorithms with a public key of cryptography from many variables whose security is associated with the hidden problem of a discrete logarithm
when you import a public key, it is usually marked as untrusted
Drag a public key into the editor window
Some OpenPGP certificates consist of a public key with several labels, each of which contains a different means of identifying the key's owner(for example,
which allows you to encrypt the transmitted information using a public key(known to all) and decrypt it using a private key(known only to its owner), which is called asymmetric encryption.
to interpretation in a public key(N. Chernyshevsky“Russian man at rendez-vous”, 1858),
To send an encrypted message to somebody of whom you have a public key, you simply create the message in the composer window. Before you send the message,
You have a public key and a private key. .
I have a public key and a private key. .
This requires a public key and a private key. .
Facebook needs a public key and a private key. .
I would have a public key and a private key. .
We need both a public key and a private key. .
You get a Public Key, and a Private Key. .
In other words, if you encrypt with a public key, it must be decrypted with a private key, and vice versa.
The important thing to understand is that the address is actually a representation of a public key, with a checksum added to avoid typing errors.
This approach allows several users to partially sign one address with a public key and if someone wants to spend bitcoins,