Примери за използване на Cryptographic keys на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Signature verification data” are data such as codes and public cryptographic keys used for electronic signature verification.
Signature verification data” means data, such as codes, passwords, algorithms or public cryptographic keys, used for the purposes of verifying an electronic signature;
Bitcoins make use of public-key cryptography, in which two cryptographic keys, one public and one private, are generated.
decrypts data in blocks of 128 bits using the cryptographic keys of 128, 192 and 256-bit- with 256-bit being the most secure.
(2) the Office shall develop and use their own cryptographic keys, tools and systems for the protection of the information in accordance with the law
samples of cryptographic keys in case of their using by telecommunication operators,
(18b)“custodian wallet provider” means an entity that provides services to safeguard private cryptographic keys on behalf of their customers,
share data about its hardware attributes with the website, and will use Verified Access to certify that its cryptographic keys are protected by Chrome hardware.
As this definition didn't capture the nature of cryptocurrencies in general- covering private cryptographic keys instead of‘digital currency' itself- their legal status is given by Brazilian Civil Code, which defines them as regular assets.
There will be launched a new definition of a“custodian wallet provider,” which would mean“an entity that provides services to safeguard private cryptographic keys on behalf of their customers, to holding, store and transfer virtual currencies”.
There will be launched a new definition of a“custodian wallet provider,” which would mean“an entity that provides services to safeguard private cryptographic keys on behalf of their customers,
These identities are likely to be cryptographic key pairs. 7.
captures the one-time cryptographic key.
The public and private keys are a mathematically bound cryptographic key pair(public/private key pair).
encoded with a complex cryptographic key.
A cryptographic key embedded in the device then sends a code that provides the second form of authentication.
Cryptographic key shall mean a method designed for concealing(coding)
they use a unique cryptographic key that changes with every connection
Onion address to hidden service directories, they will instead derive a unique cryptographic key from that address, and give that key to Tor's hidden service directories.
as well as actions in case of disclosure of a password and/ or cryptographic key;