Examples of using Public-key cryptography in English and their translations into Spanish
{-}
-
Official
-
Colloquial
this may be achieved in practice using public-key cryptography) can provide Byzantine fault tolerance in the presence of an arbitrary number of traitorous generals.
with Grzegorz Rozenberg),"Jewels of Formal Language Theory"(1981)"Public-Key Cryptography"(1990) and"DNA Computing" 1998,
Alongside"digital signatures" based on public-key cryptography, there exist various other devices, also covered in the broader notion of"electronic signature" mechanisms,
Electronic signatures may take the form of"digital signatures" based on public-key cryptography, and often generated within a"public-key-infrastructure" where the functions of creating
Acceptable algorithms for Public-key cryptography, Symmetric-key cryptography,
legal implications of using"signature" devices relying on techniques other than public-key cryptography.
where a symmetric encryption key is formed by employing public-key cryptography; and an application-level data transport function.
while the Working Group might appropriately focus its attention on issues of digital signatures in view of the apparently predominant role played by public-key cryptography in the emerging electronic-commerce practice, the uniform rules
would confine that term to those applications of public-key cryptography that were meant to serve as a functional equivalent of a signature in a paper-based context,
issues of technical alternatives to public-key cryptography; general issues of functions performed by third-party service providers;
The stunnel uses public-key cryptography with X.
The concept of public-key cryptography is relatively new.
Public-key cryptography- Wikipedia,
Public-key cryptography From Wikipedia, the free encyclopedia.
Public-key cryptography- Wikipedia,
Documents may also be encrypted without using public-key cryptography.
GnuPG uses public-key cryptography so that users may communicate securely.
It is called a crypto-currency as it uses public-key cryptography.
Two of the best-known uses of public-key cryptography are.
This is implemented through the dynamic authentication of data using public-key cryptography.