cryptographically

cryptographically
cryp·to·graph·i·cal·ly

English syllables. 2014.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Cryptographically Generated Addresses — (CGA) is a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.CGA is defined in RFC 3972.References* RFC 3972External links …   Wikipedia

  • Cryptographically secure pseudorandom number generator — A cryptographically secure pseudo random number generator (CSPRNG) is a pseudo random number generator (PRNG) with properties that make it suitable for use in cryptography. Many aspects of cryptography require random numbers, for example: Key… …   Wikipedia

  • Cryptographically strong — This term cryptographically strong is often used to describe an encryption algorithm, and implies, in comparison to some other algorithm (which is thus cryptographically weak), greater resistance to attack. But it can also be used to describe… …   Wikipedia

  • Cryptographically Generated Address — A Cryptographically Generated Address (CGA) is an Internet Protocol Version 6 (IPv6) address that has a host identifier computed from a cryptographic one way hash function.[1] This procedure is a method for binding a public signature key to an… …   Wikipedia

  • cryptographically — adverb see cryptographic …   New Collegiate Dictionary

  • cryptographically — See cryptographic. * * * …   Universalium

  • cryptographically — adverb in a cryptographic manner; using cryptography; for cryptographic purposes …   Wiktionary

  • cryptographically — adv. in a cryptographic manner, by means of cryptography …   English contemporary dictionary

  • cryptographically — adverb in a cryptographic manner • Derived from adjective: ↑cryptographic * * * adverb see cryptographic * * * cryptographˈically adverb • • • Main Entry: ↑crypt …   Useful english dictionary

  • Strong cryptography — or cryptographically strong are general terms applied cryptographic systems or components that are considered highly resistant to cryptanalysis. Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”