Examples of using Cryptographic algorithms in English and their translations into Greek
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
you use the new cryptographic algorithms to view a policy that was created on a computer that is running Windows Server 2008 or Windows Vista SP1.
a third party and the whole system is protected by heavily peer-reviewed cryptographic algorithms like those used for online banking.
select cryptographic algorithms, optionally authenticate each other,
If a rule contains cryptographic suites that use the new cryptographic algorithms, these cryptographic suites are dropped
select cryptographic algorithms, authenticate each other,
While JWA[RFC 7518] defined how to a set of commonly used cryptographic algorithms with JWS, JWE,
select cryptographic algorithms, optionally authenticate each other,
transform models, updating the set of supported cryptographic algorithms, and revisiting XML canonicalization were seen as highest priority among the several topics identified by the participants.
the entire system is protected by massive, peer-reviewed cryptographic algorithms- on a level of those used for online banking.
the whole system is fully protected by heavily peer-to-peer cryptographic algorithms like those used for online banking systems.
The United Kingdom shall ensure that cryptographic products that use classified cryptographic algorithms developed under the control of, and evaluated and approved by the Crypto Approval Authority of a Member State
Reliable cryptographic algorithm using global
DPA is securing a cryptographic algorithm that makes use of a secret key.
I have tried every cryptographic algorithm there is.
The details of a cryptographic algorithm are usually made public.
Impact: An attacker may be able to exploit weaknesses in the 3DES cryptographic algorithm.
so I'm currently analysing the cryptographic algorithm itself in order to be able to.
So you need to execute the cryptographic algorithm with the same secret many, many times to get enough leakage
So you need to execute the cryptographic algorithm with the same secret many,
Symmetric algorithm"(5) means a cryptographic algorithm using an identical key for both encryption and decryption.