เข้าสู่ระบบ สมัครสมาชิก

cryptographic การใช้

ประโยคมือถือ
  • One application for Paper Tape was the transfer of cryptographic keys.
  • Cryptographic smart cards are often used for single sign-on.
  • This has bearing on the design of provably unbreakable cryptographic algorithms.
  • Both asymmetries have been exploited in the construction of cryptographic systems.
  • In modern practice, cryptographic engineering is deployed in crypto systems.
  • Cryptographic algorithms include BATON, FIREFLY, and SDNS signature algorithm.
  • Fink imagines a cryptographic application based on the ergodic cavity configuration.
  • Libraries such as OpenSSL and LibreSSL support some such cryptographic accelerators.
  • In practice, we can use a cryptographic hash function instead.
  • Abur was also used as cryptographic writing for the Russian language.
  • This is done by utilising the diffusion properties of cryptographic MACs.
  • Lamport one-time signatures are based on cryptographic hash functions.
  • This benefit has contributed to its popularity in cryptographic software.
  • Checksums are used as cryptographic primitives in larger authentication algorithms.
  • For cryptographic systems with these two specific design goals, see HMAC.
  • The plugboard contributed more cryptographic strength than an extra rotor.
  • Finite fields are used in most cryptographic protocols used for computer security.
  • In cryptographic hash functions, a Merkle Damg錼d construction is usually used.
  • Each SLU included intelligence, communications, and cryptographic elements.
  • Block ciphers can also be used in other cryptographic protocols.
  • ตัวอย่างการใช้เพิ่มเติม:   1  2  3