Examples of using Cryptographic in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Sha-256 is a member of the sha-2 cryptographic hash functions designed by the nsa.
WPA3-Enterprise: offers the equivalent of 192-bit cryptographic strength, providing additional protections for networks transmitting sensitive data, such as government or finance.
With e-currency based on cryptographic proof, without the need to trust a third party middleman, money can be secure and transactions effortless”.
The code signing uses a cryptographic hash to verify authenticity and integrity of the software code.
The code is tied to a special cryptographic key that identifies which user account is to receive the other 70 percent.
An appropriate certificate for cryptographic messaging(such as digital signing) might state, for example,"Protects email messages.".
Because of its use of cryptographic technology to control the production and transfer of money, bitcoin is also considered an electronic cryptocurrency.
WPA3-Enterprise will offer the equivalent of 192-bit cryptographic strength and provide additional protections for networks transmitting sensitive data, such as government or finance.
During the London proof sessions, I had the opportunity to review the relevant data along three distinct lines: cryptographic, social, and technical.
Hello Server B, Server A told me that I could<claim goes here>, and here's the(cryptographic) proof.
(Copying the file doesn't give you twice the money, but losing the cryptographic signatures will make you lose the money.).
One patent reads:“To individual users, managing cryptographic keys and transacting with different cryptographic assets can be a challenge.
According to the statement, as Hyperledger has matured, projects“have started to find a need for sophisticated cryptographic implementations.”.
It includes requirements as they relate to the encryption syntax, data model, format, cryptographic processing, and external requirements and coordination.
Each block of information, such as facts or transaction details, proceed using a cryptographic principle or a hash value.
New security methods that will allow us to secure data using the laws of physics rather than using external cryptographic methods.
If your desire is to use OAuth with proper cryptography, the trend is more and more to use OAuth 2.0 with cryptographic extensions.
This information also applies to independent software vendor(ISV) applications that are written for the Microsoft Cryptographic API(CAPI).
As security requirements are becoming increasingly stringent, the U.S. Department of Defense(DoD) has specified that all cryptographic solutions must meet FIPS 140-2 Level 3 certification.
Some of these contained highly sensitive information about NATO's secret defense policies,"including installation, maintenance, procurement and use of cryptographic systems.".