Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
And they were concerned that that was giving away some sort of cryptographic information.
He had visited Britain in 1941 to facilitate the exchange of cryptographic information.
According to the charges, the communications processing unit contains "cryptographic information."
It moves through a progression that is a function of the cryptographic information stored inside this thing.
Each address has two important pieces of cryptographic information, or keys: a public one and a private one.
This enables transactions of sensitive cryptographic information to be secure even between untrusted parties.
Marks says he was ordered to deliberately withhold important cryptographic information from people investigating the Dutch operation at the time.
Covers the whole life cycle of cryptographic information (enrollment, creation, distribution, installation, usage, storage and removal).
Utilizing the unique cryptographic information in a system's TPM module ensures the identity of an individual computer.
The company keeps 10 percent of the code to itself -- this contains code belonging to third parties, cryptographic information and company competitive code.
Diffie-Hellman (DH) - this contains cryptographic information supporting the Diffie-Hellman protocol.
The Scratch and Vote system, invented by Ben Adida, uses a scratch-off surface to hide cryptographic information that can be used to verify the correct printing of the ballot.
Further, ISO/IEC 7816-15:2004 defines a common syntax (in ASN.1) and format for the cryptographic information and mechanisms to share this information whenever appropriate.
It was initially defined in the Russian national standard GOST R 34.11-94 Information Technology - Cryptographic Information Security - Hash Function.
They've developed a process in which nanotubes are used to randomly wire up part of a chip that's then used to generate cryptographic information, providing an inherently secure on-chip facility for hardware-based encryption.
And so malware running in the same processor, but in a completely different virtual machine, but like in an Amazon shared hosting environment, could obtain cryptographic information from other processors running in the machine.
According to the law, telecom operators are obliged to perform traffic pass with using protocols that support coding using security certificate, except traffic, coded by means of cryptographic information protection on the territory of the Republic of Kazakhstan.
In May 2005 Colin Percival demonstrated that on the Pentium 4, a malicious thread can use a timing attack to monitor the memory access patterns of another thread with which it shares a cache, allowing the theft of cryptographic information.
The KMA provides card issuers with cryptographic information required to bind the card to the issuer, initialize the card for use, and generate permission certificates for the loading and deleting of applications under the control of the issuer.
According to charges of espionage filed against Sergeant Lonetree and Corporal Bracy, they acted together to allow Soviet agents to go inside the embassy's most secure areas, including its communications room, where cryptographic information is stored, and the offices of the military attache.
It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices "to make them exploitable", and that NSA "obtains cryptographic details of commercial cryptographic information security systems through industry relationships".