网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_cryptography
释义

Examples of cryptography


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The most obvious and common application of cryptography is for securing communications, thus ensuring confidentiality and privacy.
The implementation of a publickey cryptography package needs to ensure that the random number object used in the generation of key pairs cannot be accessed by clients of the package.
Components for these systems are now commercially available, and it seems very likely that quantum cryptography will be an important technology long before quantum computers of useful size are constructed.
The sections on quantum cryptography, quantum proper ties of squeezed light, and experimental effor ts to measure gravitational waves provide adequate introduction to these exciting applications of quantum optics.
In contrast to symmetric cryptosystems, public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key.
Recall that, in case of asymmetric cryptography, the decryption key for a ciphertext is the inverse of the key that was used to create the ciphertext.
I turn now to the specific field covered by this debate in the field of cryptography.
From Europarl Parallel Corpus - English
There will be no mandatory link between key escrow and being an approved provider of cryptography services under the proposed e-commerce legislation.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
A register of approved providers of cryptography support services will be established.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
If we abandoned those words, the problem is that we would end up with a completely circular definition of cryptography support services.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Cryptography, that is, the electronic coding of data, has advantages in terms of confidentiality, but it also offers a refuge for organized crime.
From Europarl Parallel Corpus - English
A key tool to secure the confidentiality of electronic communications is encryption or cryptography.
From Europarl Parallel Corpus - English
In other words cryptography can be used as an electronic signature.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Cryptography is a crucial point in the debate on protecting citizens and businesses.
From Europarl Parallel Corpus - English
I am not sure that the section on approved cryptography providers could not have been dropped altogether.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Within those developments, we must ensure confidentiality and integrity in transactions, and the new science of cryptography—using secret codes to keep messages secure—will be vital.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Does she further agree that the constraint on its development is security for individuals and for business, and that cryptography exists?
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
We seem to be concentrating on cryptography, rather than on other security devices that may come on to the market.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Cryptography is now used in a large number of systems as the glue that holds things together.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The projects studied: the design and analysis of encryption algorithms, real-time compression and encryption of information in multi-media network, formal analysis of cryptographic protocols and finite automation cryptography.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The third process—and the purpose of cryptography—is to make certain that the signature in is not tampered with until it comes out at the other end.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The register will be for the benefit of customers of cryptography service providers to guide non-experts; and to help them trust and choose a service provider.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
There is widespread agreement as to the need for a kitemark, so that consumers and business alike can trust the providers of cryptography and confidentiality services.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Cryptography on an open website, however.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
In the history of cryptography, early ciphers, implemented using pen-and-paper, were routinely broken using ciphertexts alone.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The cryptography community is also interested in optical vortices, as they can communicate using a higher bandwidth of information.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
One of his most notable achievements was his groundbreaking work on cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
His project was based on the topic of cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Trying to keep keys secret is one of the most difficult problems in practical cryptography; see key management.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Created in the 15th century (1466/67), it was the peak of cryptography at that time.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Symmetric (secret key) cryptography is used in support of the encryption service.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Trust is enforced by the use of public-key cryptography and other security mechanisms.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
They adapted algorithms from cryptography and optical character recognition to make their graphs.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Since 1995, he has been performing research on quantum computing and quantum cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Pseudoprimes are of primary importance in public-key cryptography, which makes use of the difficulty of factoring large numbers into their prime factors.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
They have been extensively studied for their applications in cryptography, but have also been applied to spread spectrum, coding theory, and combinatorial design.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Prime numbers are used in a number of applications such as hash table sizing, pseudorandom number generators and in key generation for cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Used for cryptography, creating invisible walls and traps, and marking targets on the battlefield, superviolets tend to have a removed outlook.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Indeed, inevitably so, given that finance and cryptography are each built upon multiple disciplines.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In cryptography this is referred to as a transparency.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Just as with other components of a cryptography system, a software random number generator should be designed to resist certain attacks.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Strong random number generation is important throughout every phase of public key cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The award recognizes lifetime accomplishments in the field of cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, since the advent of public key cryptography the term "trapdoor" has acquired a different meaning.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Crypto-anarchists consider the development and use of cryptography to be the main defense against such problems, as opposed to political action.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Hamming weight analysis of bits is used in several disciplines including information theory, coding theory, and cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
They showed how to use public key cryptography to implement a secure information extortion attack.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Mathematical cryptography, meteorology, and rocket science were also central to the war effort, with military-funded wartime advances having a significant long-term effect on each discipline.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Fadia was dismissed as a fad by some security and cryptography enthusiasts, who attributed his success to the tech-illiterate media.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Cryptography is also used to protect digital cash, signatures, digital rights management, intellectual property rights and secure electronic commerce.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The photon's time-of-arrival ("time-bin entanglement") or polarization are used as a basis to encode quantum information for purposes such as quantum cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Such a disguised message is considered to be an example of steganography, which is a sub-branch of general cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The field of cryptography utilizes the fact that certain number-theoretic functions are randomly self-reducible.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
He also wrote and published at his own expense numerous puzzle books and enjoyed cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Moreover, extensions of the have been proposed which take into account distribution or public-key cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
He often took notes in cryptography which are displayed in the glass cabinets.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
His notable work includes research in coding theory, block cipher design, and public-key cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
He is an international expert on quantum optics, quantum cryptography and quantum communication using single photons and entanglement.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A definition of a secure channel that remains secure, even when used in arbitrary cryptographic protocols is an important building block for universally composable cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
His research interests include the design and analysis of algorithms, computational complexity and cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In 1998 (published in 2000), his group was the first to implement quantum cryptography with entangled photons.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
His intelligence work was largely connected with cryptography, and he showed exceptional skill at cryptanalysis.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Finally, photons are essential in some aspects of optical communication, especially for quantum cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The idea influenced the development of quantum key distribution protocols used in quantum cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
No one has yet succeeded in deciphering the text, and it has become a famous case in the history of cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Quantum entanglement forms the basis of quantum cryptography, which is used in high-security commercial applications in banking and government.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Digital signatures employ a type of asymmetric cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Modern cryptography intersects the disciplines of mathematics, computer science, and engineering.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Mathematical problems are used to construct a cryptography system.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The token is the data record in which claims are packed, and is protected from manipulation with strong cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Codes are used for data compression, cryptography, error detection and correction, and more recently also for network coding.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
He was awarded numerous patents for his work in the field of cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Other techniques such as cryptography were previously restricted to military applications.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However pure mathematics topics often turn out to have applications, e.g. number theory in cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Because of its facilitation of privacy, and the diminution of privacy attendant on its prohibition, cryptography is also of considerable interest to civil rights supporters.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, in cryptography, "code" has a more specific meaning.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Very accessible introduction to applied cryptography which covers most schemes of practical relevance.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Nettle is an attempt to avoid this problem by doing one thing (the low-level cryptography) and providing a simple and general interface to it.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In cryptography and mathematical economics he made contributions which today are seen as pioneering.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Probabilistic encryption is particularly important when using public key cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Linking-based time-stamping scales well - hashing is much faster than public key cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Authentication over the wire happens using public key cryptography.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Superenciphered codes of this sort were widely used and were the state of the art in practical cryptography at the time.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Elliptic curves over finite fields are notably applied in cryptography and for the factorization of large integers.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Virtual currencies don't have to use cryptography, which means that not every virtual currency is also a cryptocurrency.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Public key cryptography can be used to provide encryption, data validation, authorization, and authentication for data/messages.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Issues regarding security, and how some of these can be addressed through the use of cryptography, are described.
The most efficient way to solve this problem is cryptography.
The algorithm is used in public key cryptography which was described in previous question.
Traditionally and for thousands of years people have used what is known as private-key cryptography.
Cryptography is the art of sending secret messages.
They developed an idea known as public-key cryptography.
Language features which have been studied using -like techniques include cryptography, object-oriented languages, distribution, concurrent higher-order languages, pointers, heap regions and exceptions.
Modern-day cryptography is considered the science of information security.
The issue of security is considered next as well as how cryptography can be used to enhance security and trust in agent-mediated e-commerce.
Most current cryptography, included in electronic commerce, is based on the fact that no sufficiently fast factorisation method is known to classical computers.
When designing the system using public-key cryptography we must make sure, that computing the private-key from the public-key is infeasible.
Cryptography is strictly associated with encryption and decryption.
In the modern world this is closely linked with computers, however cryptography existed many years before the traditional computer.
No matter how powerful a computer is however, some cryptography techniques are unbreakable, for example the one-time pad technique.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2025/2/2 18:30:42