Examples of using Cryptographic operations in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
The exSymKey operation copies the key material to a file that you specify, but it does not remove the key from the HSM, change its key attributes, or prevent you from using the key in cryptographic operations.
prevent you from using it in cryptographic operations.
as well as using the CMK in cryptographic operations.
decrypt a string, using the HSM to perform the cryptographic operations.
Injects cryptographic operations into the license queries.
This parameter gives other HSM crypto users(CUs) permission to use this key in cryptographic operations.
is a hardware appliance that provides secure key storage and cryptographic operations within a tamper-resistant hardware module.
All AWS KMS cryptographic operations accept an encryption context,
It also shows that a quorum of two users must approve every cryptographic operation that uses the key.
Members are authorized to perform cryptographic operations.
Do not prompt for credentials for cryptographic operations.
Certificates are issued to subjects, but cryptographic operations with those certificates fail.
Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module TPM.
The security certified OPTIGA™ TPM offers besides cryptographic operations a tamper resistant key store for high sensible credentials,
efficient way to build in secure cryptographic operations, integrate key storage and enable active tamper detection with the MAX32558….
efficient way to build in secure cryptographic operations, integrate key storage
help prevent unapproved use of the CA and its private key by requiring the administrator to enter a password before every cryptographic operation.
Cryptographic operations- Use cryptographic keys for encryption,
All keys are securely stored and all cryptographic operations happen on this hardware.
hashing and other cryptographic operations.