Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
Let us see what 1804 will give us as a cryptographical number."
So these are the cryptographical goods you mentioned.
The aim was to relax the export controls and ensure that cryptographical restrictions did not become entrenched.
Bacon's candidacy relies upon historical and literary conjectures, as well as alleged cryptographical revelations.
At the beginning of December it was decided that cryptographical goods should also be subject to the Wassenaar Arrangement.
The resulting diagraphs can be fed into a software Enigma (that does not support enciphering numbers) analog increasing its cryptographical power.
Cryptographical goods are used specifically for protection against Echelon and other spying activities carried out by the USA.
And that was precisely the aim of the EU Member States, namely to prevent cryptographical restrictions from being entrenched in these new rules.
Cipher runes, or cryptic runes, are the cryptographical replacement of the letters of the runic alphabet.
The first computers, room-sized electro-mechanical devices built to break cryptographical codes during World War II, quickly became at least 20 times smaller using transistors.
What are the Council's grounds for not allowing free trade in cryptographical goods, and does the Wassenaar decision accord with the WTO Agreement?
Mr President, Mr Seppänen, under the Wassenaar Arrangement, cryptographical goods always were subject to export controls.
Cryptographical methods of this kind benefit from the flexibility of the geometric objects, hence their group structures, together with the complicated structure of these groups, which make the discrete logarithm very hard to calculate.
At their plenary meeting on 2 and 3 December 1998, the 33 contracting states of the Wassenaar Arrangement merely decided to review the rules on export controls for encryption techniques; these are known as cryptographical goods.
That is, the DMT will be in the business of providing privacy, and doing so in a cryptographical framework which provides a more solid basis for customer anonymity than the traditional ones of (allegedly) tight-lipped bankers or (often-leaky) banking secrecy laws.
The corps includes Unit 8200, which is the IDF central collection unit, responsible for SIGINT collection and cryptographical analysis, including the Hatzav Unit, responsible for collecting OSINT intelligence.
Entries in BitTorrent indexes typically contain a textual description of the file, credits, a cryptographical identifier and a list of Internet hosts willing to transmit the file or coordinate the transmission, given said cryptographical identifier.
Mr President-in-Office of the Council, did I understand correctly that you mentioned a decision taken at a meeting on 2 and 3 December 1998 at the plenary meeting of the states participating in the Wassenaar Arrangement to ease trade restrictions in respect of cryptographical goods?
Was I right in thinking that you said the trade in cryptographical goods has become less restricted, and do you think that this licensing arrangement for trade in cryptographical goods is generally in line with WTO regulations?
Cryptographic research takes place in two separate lines of work.
The key is then loaded into another cryptographic system as needed.
The records, including cryptographic material ended up in the hands of Americans.
It's the nature of cryptographic weaknesses that they grow over time.
The solution to both of these problems is cryptographic certificates.
Yet the cryptographic definition is that you cannot go backwards.
And what they never have is our cryptographic key.
In particular, it may help to improve the cryptographic security of the corresponding system.
There is no need for specific cryptographic hardware with its limitations.
More recently, however, cryptographic techniques have been applied to a variety of commercial problems.
Its cryptographic keys are at least 2048 bits in length.
Originally the focus was on the development of cryptographic software solutions.
The content (if any) of this cryptographic message is still unknown.
I am sure there must be some cryptographic safeguards to prevent this.
Between each try, there would be an additional six hours for him to learn how to operate the cryptographic machine.
He said the security agency had fought efforts to establish a cryptographic industry in this country.
This procedure, an exchange of cryptographic numbers, is a standard security measure.
That legislation would end Government control over cryptographic systems.
There's really no need to spend a whole episode talking about cryptographic random numbers.
"It looks that way, Major," the cryptographic warrant officer said.
This provides a strong cryptographic check that the card is genuine.
It has been used in other security investigations of various cryptographic algorithms.
For an overview of cryptographic technology in general, see Cryptography.
As of 2005 this is an active area of cryptographic research.
In the end, I employed a rather less elegant cryptographic tack.