English » Arabic

public key COMPUT

public key N COMPUT

public key encryption N COMPUT

Monolingual examples (not verified by PONS Editors)

English
The signed hash is stored in the assembly along with the public key.
en.wikipedia.org
When the public key is fake, it follows that no one can decipher data enciphered using the fake public key.
en.wikipedia.org
Public key systems are based upon algorithms that are at least strongly believed to be one-way operations.
en.wikipedia.org
Therefore, the sender of the message can not decrypt the message once it has been encrypted using the receivers public key.
en.wikipedia.org
However, since the advent of public key cryptography the term "trapdoor" has acquired a different meaning.
en.wikipedia.org
Therefore, each service may have different service primitives, such as a data encryption algorithm, public key, or initialization vector.
en.wikipedia.org
The procedures are intended to be compatible with a wide range of public key management approaches, including both ad hoc and certificate-based schemes.
en.wikipedia.org
The certificate binds a public key to the identity of their respective owners.
en.wikipedia.org
This signature can be verified by using the client's certificate's public key.
en.wikipedia.org
Note that the public key "n" is typically 1024-bits or even longer, thus much larger than typical symmetric keys.
en.wikipedia.org

Look up "public key" in other languages


Choose your language Deutsch | English | Español | Français | Italiano | Polski