Werbung
 ⇄Suchrichtung
 Übersetzung für 'public key' von Englisch nach Deutsch
NOUN   a public key | public keys
comp.
public key [cryptography]
öffentlicher Schlüssel {m} [Kryptographie]
3 Wörter
comp.
public key infrastructure <PKI>
Public-Key-Infrastruktur {f} <PKI>
public-key cryptographyPublic-Key-Kryptografie {f}
Teiltreffer
in the public / public's mind {adv}im öffentlichen Bewusstsein
comp.
identification key <ID key>
Kennungs­geber {m}
comp.
function key <Fn key>
Funktion-Taste {f} <Fn-Taste>
comp.
ten-key pad <10-key pad> [numeric cluster]
Zehnertastaturfeld {n}
comp.
ten-key pad <10-key pad>
Zehnertastatur {f}
tech.
key
Passfeder {f}
59
to keyTaste drücken
key {adj}wesentlich
29
comp.mus.tech.
key
Taste {f}
478
keyKeil {m} [Verbindungs­element]
28
keyChiffre {f}
15
key {adj}entscheidend
322
to keyeingeben
419
tech.
to key
keilen [mit Keil befestigen, z. B. Nabe auf Welle]
12
mus.
key
Tonart {f}
105
mus.
key
Klappe {f} [an Blasinstrument]
37
keyAufschlüsselung {f}
14
keySchlüssel {m}
1791
keyLegende {f} [Zeichenerklärung]
90
public {adj}öffentlich
2557
23 Übersetzungen
Neue Wörterbuch-Abfrage: Einfach jetzt tippen!

  • Public-Key-Infrastruktur {f} <PKI> = public key infrastructure <PKI>
  • Public-Key-Kryptografie {f} = public-key cryptography
  • Public diplomacy {f} = public diplomacy
  • Ordre public {f} = public policy
  • Public Viewing {n} = watch party [live broadcast of sports or other events in public]
  • Public Viewing {n} = [public watching of large-screen TV broadcasts, esp. of football/soccer matches]
  • Public Domain {f} = public domain
  • Public Viewing {n} = public viewing (event / party) [esp. football / soccer]
  • Public-Health-Maßnahme {f} = public health measure
  • Public Relations {pl} <PR> = public relations <PR> [treated as a sg. or pl.]
  • Key Visuals {pl} = key visuals {pl}
  • Hot Key {m} = hot key [also: hotkey]
  • Hot Key {m} = hotkey
  • Public-Private-Partnership {f} <PPP> = public-private partnership <PPP>
  • Key Biscayne {f} [Insel] = Key Biscayne [Florida]
  • Secret-Key-Kryptografie {f} = secret-key cryptography
  • High-key-Fotografie {f} = high-key photography
  • Low-key-Fotografie {f} = low-key photography
  • Key-Account-Management {n} = key account management
  • Key-Account-Manager {m} = key account manager
  • Key Biscayne {n} [Stadt] = Key Biscayne [Florida]
  • Dental Public Health {f} [öffentliche Zahngesundheit] = dental public health [recognized specialty in dentistry]
alle anzeigen ...
Anwendungsbeispiele Englisch
  • Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication.
  • The presumed difficulty of this problem is important for the algorithms used in cryptography such as RSA public-key encryption and the RSA digital signature.
  • They must be protected from unauthorized disclosure and destruction, and they must be available when needed. Public key infrastructure (PKI) solutions address many of the problems that surround key management.
  • For example, there is the existing BGP safeguard called Routing Public Key Infrastructure (RPKI).
  • To prepare a web server to accept HTTPS connections, the administrator must create a public key certificate for the web server.

  • This fact was kept secret until 1997, by which time public key cryptography in the form of RSA (equivalent to Cocks' system) via PGP and SSL had entered widespread use.
  • SSKs are based on public-key cryptography. Currently Freenet uses the DSA algorithm.
  • The two main types of keys in cryptographic systems are symmetric-key and public-key (also known as asymmetric-key).
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
  • The Cold War meant that cryptography remained important, with fundamental advances such as public-key cryptography being developed in the following decades.

  • DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography.
  • Newer Intel platforms have Intel Boot Guard (IBG) technology enabled, this technology will check the BIOS digital signature at startup, and the IBG public key is fused into the PCH.
  • Asymmetric cryptography (or public-key cryptography) is cryptography that relies on using two (mathematically related) keys; one private, and one public.
  • Similarly, the discrete logarithm is the multi-valued inverse of the exponential function in finite groups; it has uses in public-key cryptography.
Werbung
© dict.cc English-German dictionary 2024
Enthält Übersetzungen von der TU Chemnitz sowie aus Mr Honey's Business Dictionary (nur Englisch/Deutsch).
Links auf das Wörterbuch oder auch auf einzelne Übersetzungen sind immer herzlich willkommen!