Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
It has been used in other security investigations of various cryptographic algorithms.
Some of this theoretical research has been incorporated into real cryptographic algorithms.
It is an approach used by many cryptographic algorithms and cryptosystems.
Schneier has been involved in the creation of many cryptographic algorithms.
A protocol describes how the cryptographic algorithms should be used to secure information.
Such systems almost always use symmetric key cryptographic algorithms.
It provides a wide variety of cryptographic algorithms, formats, and protocols.
There are two basic types of cryptographic algorithms.
This has bearing on the design of provably unbreakable cryptographic algorithms.
The Feistel construction is also used in cryptographic algorithms other than block ciphers.
This one way function behavior makes modular exponentiation a candidate for use in cryptographic algorithms.
Malleability is a property of some cryptographic algorithms.
However, other existing cryptographic algorithms do not appear to be broken by these algorithms.
All cryptographic algorithms are in the crypto card.
It contains both the cryptographic algorithms as well as the key(s) used for encryption.
Government applications, including use within other cryptographic algorithms and protocols, for the protection of sensitive unclassified information.
As is often the case with cryptographic algorithms, slight modifications allow both encryption and digital signature.
Keys are also used in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
The draft report recommends many cryptographic algorithms, protocols, and techniques, but some of them are recommended only conditionally.
A third class of information theory codes are cryptographic algorithms (both codes and ciphers).
Additionally, some cryptographic algorithms have export restrictions (see export of cryptography).
GSM uses several cryptographic algorithms for security.
Cryptographic algorithms defined for use with IPsec include:
Research areas: cryptographic algorithms, message protocols, and coding techniques to enhance enterprise and mobile applications.
The DS-101 protocol can also be used to load cryptographic algorithms and software updates for crypto modules.