Help


[permalink] [id link]
+
Page "Public-key cryptography" ¶ 69
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Examples and key
Examples include calcium carbide, silicon carbide, tungsten carbide ( often called simply carbide ), and cementite, each used in key industrial applications.
Examples of well-regarded asymmetric key techniques for varied purposes include:
Examples of asymmetric key algorithms not widely adopted include:
Examples of protocols using asymmetric key algorithms include:
Examples include the " masculinized genitalia in female hyenas, exaptive use of an umbilicus as a brooding chamber by snails, the shoulder hump of the giant Irish deer, and several key features of human mentality.
Examples include major pieces of equipment, suitable factory space, and key managerial personnel.
Examples of extended techniques include bowing under the bridge of a string instrument or with two different bows, using key clicks on a wind instrument, blowing and overblowing into a wind instrument without a mouthpiece, or inserting objects on top of the strings of a piano.
Examples of more sophisticated challenge – response algorithms are zero-knowledge password proof and key agreement systems ( such as Secure Remote Password ( SRP )), CRAM-MD5, and ssh's challenge – response system based on RSA.
Examples of such key derivation functions include KDF1, defined in IEEE Std 1363-2000, and similar functions in ANSI X9. 42.
Examples include William Colby, who became director of the CIA, Lucien Conein, who was a key CIA officer in Vietnam, General John Singlaub and Colonel Aaron Bank ( founder of United States Army Special Forces ).
Examples of the round-bottomed Unstan ware have been found here, and provided the key to dating the settlement.
Examples of single line tokens: Tablet on left, key token on right
Examples included participating in a limited jousting exercise, or removing the key from a horse's braided mane.
Examples of key generators include linear feedback shift registers ( LFSR ) and the Solitaire ( or Pontifex ) cipher.
Examples of integrated locking mechanisms are rotating disks ( found in " Scandinavian " style padlocks where a disk rotated by the key enters a notch cut into the shackle to block it from moving ) or lever tumblers ( where a portion of the bolt that secures the shackle enters the tumblers when the correct key is turned in the lock ).
Examples include new investments, expansions, venture capital funding, joint ventures and strategic alliances in key areas such as R & D, business services and core industrial sectors.
Examples of bridge logic abound in Reese, for instance, a player who overcalls but does not lead his suit is likely to lack one or two key honours ; this concept is often called ' the dog that did not bark in the night ' ( after Sherlock Holmes in Arthur Conan Doyle's Silver Blaze ).

Examples and algorithms
Examples include: pattern recognition, data mining, machine learning algorithms, and visualization.
Examples of adaptive-routing algorithms are the Routing Information Protocol ( RIP ) and the Open-Shortest-Path-First protocol ( OSPF ).
Examples of algorithms for this class are the minimax algorithm, alpha-beta pruning, and the A * algorithm.
Examples of algorithms are the Fast Fourier transform ( FFT ), finite impulse response ( FIR ) filter, Infinite impulse response ( IIR ) filter, and adaptive filters such as the Wiener and Kalman filters.
Examples of popular and well-respected symmetric algorithms include Twofish, Serpent, AES ( Rijndael ), Blowfish, CAST5, RC4, 3DES, and IDEA.
Examples of such algorithms include:
Examples of emergent algorithms and models include cellular automata, artificial neural networks and swarm intelligence systems ( ant colony optimization, bees algorithm, etc.
Examples of priority inheritance algorithms include ( from simplest to most complex ):
Examples of decompression algorithms are Bühlmann tables, the Multi-Tissue Model, the Varying Permeability Model, and the Reduced Gradient Bubble Model.
Examples of local search algorithms are WalkSAT and the 2-opt algorithm for the Traveling Salesman Problem.
Examples of muscle memory are found in many everyday activities that become automatic and improve with practice, such as riding a bicycle, typing on a keyboard, typing in a PIN, playing a melody or phrase on a musical instrument, playing video games, or performing different algorithms for a Rubik's Cube.
Examples of large and complex astronomical algorithms are those used to calculate the position of the Moon.
Examples of artificial intelligence algorithms applied to real-world problems.
Examples of medical algorithms are:
Examples of such algorithms:
Examples of classification algorithms include:
Examples of deterministic encryption algorithms include the RSA cryptosystem ( without encryption padding ), and many block ciphers when used in ECB mode or with a constant initialization vector.

Examples and include
Examples of such courts include the New Jersey Court of Errors and Appeals ( which existed from 1844 to 1947 ), the Connecticut Supreme Court of Errors ( which has been renamed the Connecticut Supreme Court ), the Kentucky Court of Errors ( renamed the Kentucky Supreme Court ), and the Mississippi High Court of Errors and Appeals ( since renamed the Supreme Court of Mississippi ).
Examples include Web accessibility a set of guidelines and two accessible web portals designed for people developing reading skills are peepo. com — try typing a letter with your keyboard for more — and peepo. co. uk with enhanced graphics, unique style controls and improved interactivity ( requires an SVG supported browser ).
Examples of assistive technology for visually impairment include the Canadian currency tactile feature, which a system of raised dots in one corner, based on Braille cells but not standard Braille.
Examples of ATC include: NeuroPage which prompt users about meetings, Wakamaru, which provides companionship and reminds users to take medicine and calls for help if something is wrong, and telephone Reassurance systems.
Examples include alcohols and amines which contain O-H or N-H fragments.
Examples of Lewis acids include all metal cations, and electron-deficient molecules such as boron trifluoride and aluminium trichloride.
Examples of present-day abjads are the Arabic and Hebrew scripts ; true alphabets include Latin, Cyrillic, and Korean hangul ; and abugidas are used to write Tigrinya, Amharic, Hindi, and Thai.
Examples of true annuals include corn, wheat, rice, lettuce, peas, watermelon, beans, zinnia and marigold.
Examples of this type of communication include radio and traditional television programs such as the news.
Examples of category-theoretic statements which require choice include:
Examples of other diseases of the motor neuron that should not be confused with MND include spinobulbar muscular atrophy, spinal muscular atrophy, Charcot-Marie-Tooth disease, and many others.
Examples include optic ataxia ( lack of coordination between visual inputs and hand movements, resulting in inability to reach and grab objects.
Examples include one presented to Warner in 1904, another to Australian Captain M. A.
Examples include materials such as brass, pewter, phosphor bronze and amalgam.
Examples of substitutional alloys include bronze and brass, in which some of the copper atoms are substituted with either tin or zinc atoms.
Examples of Web-based Applets include:
Examples include lanthionine, 2-aminoisobutyric acid, dehydroalanine, and the neurotransmitter gamma-aminobutyric acid.
Examples include electron-transfer.
Examples of journeys to the realm include " Thomas the Rhymer " and the fairy tale " Childe Rowland ", the latter being a particularly negative view of the land.
Examples include the past tense and the plural morphemes.
Examples of allotropes include:
Examples include red-green color blindness and Fragile X syndrome.
Examples of prayer which are unique to Luke include Jesus's prayers at the time of his baptism (), his praying all night before choosing the twelve (), and praying for the transfiguration ().
Examples include the U. S. M901 ITV ( Improved TOW Vehicle ) and the Norwegian NM142, both on an M113 chassis, several Soviet ATGM launchers based on the BRDM reconnaissance car, the British FV438 Swingfire and FV102 Striker and the German Raketenjagdpanzer series built on the chassis of the HS 30 and Marder IFV.
Examples of pre-packed American meals include various casserole type dishes such as Hamburger Helper, as well as bakeable and microwaveable foods such as Hot Pockets, frozen pizzas, frozen burritos, and various types of TV dinner meals.

1.431 seconds.