Examples of 'cryptographic function' in a sentence

Meaning of "cryptographic function"

cryptographic function: A mathematical algorithm used in cryptography to secure and protect data

How to use "cryptographic function" in a sentence

Basic
Advanced
cryptographic function
Seventh example is data hashing by a cryptographic function.
The cryptographic function receives at least a first cryptographic key as an argument.
This concerns the reading of the transform obtained by the first cryptographic function.
The cryptographic function should be a function which generates such distinctive challenges.
That makes it that much more difficult to deduce the cryptographic function F used.
This cryptographic function is known both by the service supplier and by the authentication device.
According to a particular feature, the cryptographic function is a one-way function.
Further, the cryptographic function may be an encoding function, a hash function or a cipher based function.
First enciphering / deciphering means able to establish a cryptographic function with the aid of a storage passkey ;.
The OTP may be a cryptographic function of the OTP generation key and the current time.
For example, signal EN is the enable signal of a cryptographic function.
The result of the cryptographic function produces the pairing key PK.
In the exemplary embodiment described, the crypto-system C is reduced to a symmetric cryptographic function.
To prove that a cryptographic function is safe, it is often compared to a random oracle.
The Verification Data is a cryptographic function of,.

See also

As an example, a cryptographic function can be a function for encrypting a digital key.
Module 20 is able to execute a cryptographic function.
In other words, the cryptographic function should have a distinctive character.
In layman 's terms, this is how ZenGo describes the cryptographic function of TSS,.
When the comparisons agree, a cryptographic function of the first software SW 1 can be validated.
Method according to any of the preceding claims, wherein the process ( F ) involves a cryptographic function.
According to an embodiment, each cryptographic function of the first software comprises,.
The cryptographic function can be of one-way type ( Hash function ).
Generate at least one result RESULT _ 2 of a cryptographic function of the second software SW 2 ;.
The second cryptographic function is able to process non-redundant data ;.
The resulting number functions as starting value ( starting vector ) for the cryptographic function F2.
The function f is, for example, a cryptographic function or a function based on hashing functions.
The light source 110 comprises a challenge generator 118 which generates a challenge with a cryptographic function.
In a variant, the cryptographic function F can be an asymmetrical encryption function.
Module 12 is able to execute a cryptographic function defined by a mathematical description F K.
The aim of the cryptographic function 360 is to process and decrypt the received encrypted information 340.
Obviously, the cryptographic function f 2 is then not used.
In other embodiments the cryptographic function f(… ) may receive more arguments.
The 64 bits from the cryptographic function are grouped into 4 times 4 symbols.
For instance, the cryptographic function SHA-1 may be used, EPMATHMARKEREP.

You'll also be interested in:

Examples of using Function
He could not function any other way
Function keys with preset multimedia actions
The desired function word will flash
Show more
Examples of using Cryptographic
I have tried every cryptographic algorithm there is
Cryptographic functions can not modified by user
Such a pair is called a cryptographic hash collision
Show more

Search by letter in the English dictionary