A cryptographic key is virtualized to provide a virtual cryptographic key.
Alternatively, key splits are bound to generate a cryptographic key, and a cryptographic algorithm is initialized with the cryptographic key.
The apparatus includes a cryptographic key generator which generates a cryptographic key using the random number.
A key modifier (211) determines a shared cryptographic key by applying the perturbation value to the first cryptographic key.
The activation code allows the cryptographic key in the inactive state to be activated to form the cryptographic key in the active state.
An encryption method and apparatus in which a cryptographic encryption key (K) for use to encrypt or decrypt communications is first derived from a cryptographic key (Kd) provided by a user.
The encryption key may also be used to decrypt data.
Because these companies don't have the encryption key, even if their servers get hacked, hackers wouldn't be able to decrypt your data.
The set of parameters represents at least part of a cryptographic algorithm including a cryptographic key.
Alice generates a sequence of key bits forming an initial cryptographic key.
The MSC emulation entity transmits the cryptographic key to media gateway(or goal media gateway), and the media gateway recover the cryptographic key.
The cryptographic binding is the registration of cryptographic keys between the hardware component and the platform.
A method for establishing a cryptographic key for a user is of the type wherein data permitting establishment of the key is escrowed.
The data structure includes at least one secret drawer including encrypted content, and an identifier associated with a cryptographic key, the cryptographic key capable of decrypting the encrypted content.
The secure device stores a first cryptographic key associated with the service technician.
To mitigate this problem a cryptographic system for reproducibly establishing a cryptographic key is presented.
A technique for generating a cryptographic key (120) is provided.
Some of the arithmetic operations employ a long-term cryptographic key.
A cryptographic key is available for use in order to trigger when these emulated operations occur.
Some of the arithmetic operations employ a long term cryptographic key.
Each client key further includes a secret cryptographic key unique to each client device (1115).
Individual cards or devices are associated with a cipher key.
A public cryptographic key, linked to the private cryptographic key of an organization or private person
Requêtes fréquentes français :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Requêtes fréquentes anglais :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Traduction Translation Traducción Übersetzung Tradução Traduzione Traducere Vertaling Tłumaczenie Mετάφραση Oversættelse Översättning Käännös Aistriúchán Traduzzjoni Prevajanje Vertimas Tõlge Preklad Fordítás Tulkojumi Превод Překlad Prijevod 翻訳 번역 翻译 Перевод