Examples of using Cryptographic in English and their translations into Russian
{-}
-
Official
-
Colloquial
Development of facilities of cryptographic defence of information SKZI.
Select the version of a cryptographic protocol that you want to use.
P1: referenced key valid for all cryptographic operations.
Members of this group are authorized to perform cryptographic operations.
Individual Bitcoins are calculated as cryptographic keys in peer-to-peer networks.
Cryptographic Stack Machine Notation One.
Creation of a cryptographic protocol for secure communication.
The research shows some capabilities to use model checking method for cryptographic protocol verification.
other similar cryptographic devices.
Cryptographic Service Providers.
Cryptographic systems and algorithms.
Only WEP is allowed as the cryptographic encapsulation algorithm for management frames of subtype Authentication.
Support of versions 1.1 and 1.2 of cryptographic protocol TLS for client connection.
Software for generation of digital signature and library for cryptographic methods;
VPN tunnel's security is guaranteed by the use of the strongest cryptographic algorithms.
Cryptographic Service Providers.
Cryptographic systems.
Verification of Cryptographic Checksum failed.
That the data message has not been altered since the cryptographic transformation.”.
A googletechtalk video on voting using cryptographic methods.