Examples of using Cryptographic operations in English and their translations into Spanish
{-}
-
Colloquial
-
Official
using the HSM to perform the cryptographic operations.
to build a Java-based sample application that uses SafeNet Luna products for secure cryptographic operations.
Each algorithm defines what parameters must be used for each cryptographic operation.
The cryptographic operation failed due to a local security option setting.
It also shows that a quorum of two users must approve every cryptographic operation that uses the key.
their NAT/firewall/etc is improperly configured, they're going to consistently(though not constantly, thanks to the banlist) cause a futile expensive cryptographic operation on all the peers they know about.
this method does not create a fault in the ongoing cryptographic operation and is invisible to the victim.
Members are authorized to perform cryptographic operations.
Members are authorized to perform cryptographic operations.
It has an HSM for cryptographic operations.
Injects cryptographic operations into the license queries.
Security in Communication- Cryptographic operations, encryption keys.
Cryptographic Primitives- enable you to perform fundamental cryptographic operations.
The libraries enable your application to perform cryptographic operations on the HSMs.
Cryptographic operations- Use cryptographic keys for encryption,
use keys in cryptographic operations.
As a result, user 4 can no longer use key 6 in cryptographic operations.
PROTECTING AND MANAGING PRIVATE KEYS All the cryptographic operations are carried out within the HSM.
A crypto user(CU) can perform the following key management and cryptographic operations.
Users who share the key can use it in cryptographic operations, but not delete it.