网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_cryptographic-key
释义

cryptographic key

collocation in English

meanings of key


These words are often used together. Click on the links below to explore the meanings. Or, see other collocations with key.
key
noun[C]
uk /kiː/ us /kiː/
a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ...
See more at key


Examples of cryptographic key


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Each message has to be encrypted using some cryptographickey that is known only to the intended receivers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Address assignment and cryptographickey initialization is sometimes performed by closing a contact on the device while having a master controller broadcast an assignment message.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographickey is unknown.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
One-time pad encryption has the absolute requirement that the cryptographickey is used only once.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The token may, for example, be a cryptographickey, that is protected by encrypting it under a password.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Some vendors offer a mobile device authentication solution that uses a cryptographickey for user authentication.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The cryptographickey or the nationality of the entities involved in the transaction do not matter.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Another situation where quick guessing is possible is when the password is used to form a cryptographickey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographickey, through the process of decryption.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
To win, a contestant would have had to break the code by finding the original plaintext and the cryptographickey that will generate the posted ciphertext from the plaintext.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Consider two observers of a sequence of bits, when only one of whom has the cryptographickey needed to turn the sequence of bits into a readable message.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
For example, if we periodically contact a server to determine its health, a monitor will never see a failure unless the monitor tries to verify the server's cryptographickey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Names can model a wide variety of identifiers: communication channels, machine addresses, pointers, object references, cryptographic keys, and so on.
With a cryptographickey used for interchange, the decrypted key will be immediately reencrypted and will be routed to the issuer's system over normal communications channels.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Well, some police officers came in and asked me to get the cryptographic keys, so that we could decrypt something.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Regardless of the technique used, such methods are intended to capture highly sensitive information e.g. cryptographic keys, key-rings, passwords or unencrypted plaintext.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The cryptographic keys are typically, but not necessarily, self-generated.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The attack can non-invasively extract cryptographic keys and other secret information from the device.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users can easily create cryptographic keys, and write, encrypt, decrypt, sign, or verify messages.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The latter depends on the secrecy of cryptographic keys.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition of key
See other collocations with key
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2025/1/23 6:06:15