词汇 | example_english_cryptographic-key |
释义 | cryptographic keycollocation in Englishmeanings of keyThese words are often used together. Click on the links below to explore the meanings. Or, see other collocations with key. key noun[C] uk /kiː/ us /kiː/ a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ... See more at key Examples of cryptographic keyThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Each message has to be encrypted using some cryptographickey that is known only to the intended receivers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Address assignment and cryptographickey initialization is sometimes performed by closing a contact on the device while having a master controller broadcast an assignment message. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographickey is unknown. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. One-time pad encryption has the absolute requirement that the cryptographickey is used only once. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The token may, for example, be a cryptographickey, that is protected by encrypting it under a password. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Some vendors offer a mobile device authentication solution that uses a cryptographickey for user authentication. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The cryptographickey or the nationality of the entities involved in the transaction do not matter. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Another situation where quick guessing is possible is when the password is used to form a cryptographickey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographickey, through the process of decryption. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To win, a contestant would have had to break the code by finding the original plaintext and the cryptographickey that will generate the posted ciphertext from the plaintext. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Consider two observers of a sequence of bits, when only one of whom has the cryptographickey needed to turn the sequence of bits into a readable message. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. For example, if we periodically contact a server to determine its health, a monitor will never see a failure unless the monitor tries to verify the server's cryptographickey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Names can model a wide variety of identifiers: communication channels, machine addresses, pointers, object references, cryptographic keys, and so on. With a cryptographickey used for interchange, the decrypted key will be immediately reencrypted and will be routed to the issuer's system over normal communications channels. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Well, some police officers came in and asked me to get the cryptographic keys, so that we could decrypt something. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Regardless of the technique used, such methods are intended to capture highly sensitive information e.g. cryptographic keys, key-rings, passwords or unencrypted plaintext. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The cryptographic keys are typically, but not necessarily, self-generated. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The attack can non-invasively extract cryptographic keys and other secret information from the device. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Users can easily create cryptographic keys, and write, encrypt, decrypt, sign, or verify messages. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The latter depends on the secrecy of cryptographic keys. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Want to learn more? Go to the definition of key See other collocations with key |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。