Help


[permalink] [id link]
+
Page "Public-key cryptography" ¶ 66
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Examples and asymmetric
Examples of well-regarded asymmetric key techniques for varied purposes include:
Examples of protocols using asymmetric key algorithms include:
Examples of asymmetric tops: anthracene ( C < sub > 14 </ sub > H < sub > 10 </ sub >), water ( H < sub > 2 </ sub > O ), nitrogen dioxide ( NO < sub > 2 </ sub >)
Examples where this is true include ADSL ( where the " A " stands for " asymmetric "), cable modems, cellular Internet access facilities ( e. g. 3G ) and satellite internet access ( e. g. ASTRA2Connect ).

Examples and key
Examples include calcium carbide, silicon carbide, tungsten carbide ( often called simply carbide ), and cementite, each used in key industrial applications.
Examples of notable-yet insecure-asymmetric key algorithms include:
Examples include the " masculinized genitalia in female hyenas, exaptive use of an umbilicus as a brooding chamber by snails, the shoulder hump of the giant Irish deer, and several key features of human mentality.
Examples include major pieces of equipment, suitable factory space, and key managerial personnel.
Examples of extended techniques include bowing under the bridge of a string instrument or with two different bows, using key clicks on a wind instrument, blowing and overblowing into a wind instrument without a mouthpiece, or inserting objects on top of the strings of a piano.
Examples of more sophisticated challenge – response algorithms are zero-knowledge password proof and key agreement systems ( such as Secure Remote Password ( SRP )), CRAM-MD5, and ssh's challenge – response system based on RSA.
Examples of such key derivation functions include KDF1, defined in IEEE Std 1363-2000, and similar functions in ANSI X9. 42.
Examples include William Colby, who became director of the CIA, Lucien Conein, who was a key CIA officer in Vietnam, General John Singlaub and Colonel Aaron Bank ( founder of United States Army Special Forces ).
Examples of the round-bottomed Unstan ware have been found here, and provided the key to dating the settlement.
Examples of single line tokens: Tablet on left, key token on right
Examples included participating in a limited jousting exercise, or removing the key from a horse's braided mane.
Examples of key generators include linear feedback shift registers ( LFSR ) and the Solitaire ( or Pontifex ) cipher.
Examples of integrated locking mechanisms are rotating disks ( found in " Scandinavian " style padlocks where a disk rotated by the key enters a notch cut into the shackle to block it from moving ) or lever tumblers ( where a portion of the bolt that secures the shackle enters the tumblers when the correct key is turned in the lock ).
Examples include new investments, expansions, venture capital funding, joint ventures and strategic alliances in key areas such as R & D, business services and core industrial sectors.
Examples of bridge logic abound in Reese, for instance, a player who overcalls but does not lead his suit is likely to lack one or two key honours ; this concept is often called ' the dog that did not bark in the night ' ( after Sherlock Holmes in Arthur Conan Doyle's Silver Blaze ).

Examples and algorithms
Examples include: pattern recognition, data mining, machine learning algorithms, and visualization.
Examples of adaptive-routing algorithms are the Routing Information Protocol ( RIP ) and the Open-Shortest-Path-First protocol ( OSPF ).
Examples of algorithms for this class are the minimax algorithm, alpha-beta pruning, and the A * algorithm.
Examples of algorithms are the Fast Fourier transform ( FFT ), finite impulse response ( FIR ) filter, Infinite impulse response ( IIR ) filter, and adaptive filters such as the Wiener and Kalman filters.
Examples of popular and well-respected symmetric algorithms include Twofish, Serpent, AES ( Rijndael ), Blowfish, CAST5, RC4, 3DES, and IDEA.
Examples of such algorithms include:
Examples of emergent algorithms and models include cellular automata, artificial neural networks and swarm intelligence systems ( ant colony optimization, bees algorithm, etc.
Examples of priority inheritance algorithms include ( from simplest to most complex ):
Examples of decompression algorithms are Bühlmann tables, the Multi-Tissue Model, the Varying Permeability Model, and the Reduced Gradient Bubble Model.
Examples of local search algorithms are WalkSAT and the 2-opt algorithm for the Traveling Salesman Problem.
Examples of muscle memory are found in many everyday activities that become automatic and improve with practice, such as riding a bicycle, typing on a keyboard, typing in a PIN, playing a melody or phrase on a musical instrument, playing video games, or performing different algorithms for a Rubik's Cube.
Examples of large and complex astronomical algorithms are those used to calculate the position of the Moon.
Examples of artificial intelligence algorithms applied to real-world problems.
Examples of medical algorithms are:
Examples of such algorithms:
Examples of classification algorithms include:
Examples of deterministic encryption algorithms include the RSA cryptosystem ( without encryption padding ), and many block ciphers when used in ECB mode or with a constant initialization vector.

Examples and widely
Examples of Lewis dot-style chemical bonds between carbon C, hydrogen H, and oxygen O. Lewis dot depictures represent an early attempt to describe chemical bonding and are still widely used today.
Examples of eicosanoids are the widely studied prostaglandins.
Examples include dimethyl methylphosphonate, a precursor to sarin but which is also used as a flame retardant and Thiodiglycol which is a precursor chemical used in the manufacture of mustard gas but is also widely used as a solvent in inks.
Examples include Myra Hindley whose proposed release from prison after thirty years was widely condemned by the British press ( the argument became moot when she died in 2002 ); Maxine Carr who, having served her sentence, has been released and is, according to some commentators being " demonised by the press ".
Examples of diols in which the hydroxyl functional groups are more widely separated include 1, 4-butanediol HO —( CH < sub > 2 </ sub >)< sub > 4 </ sub >— OH and bisphenol A, and propylene-1, 3-diol or beta propylene glycol, HO-CH < sub > 2 </ sub >- CH < sub > 2 </ sub >- CH < sub > 2 </ sub >- OH.
Examples include The Guardian withdrawing its extended interview and profile of Noam Chomsky in 2005 which was widely seen as a smear and was subsequently apologized for by the editors, and the deletion of a 2006-12-21 Op-Ed piece by Daniel Johnson in the New York Sun.
Examples of " classical " chart patterns as popularized by Edwards and Magee and used widely by traders and investors include:

1.454 seconds.