Examples of 'public-key' in a sentence

Meaning of "public-key"

Public-key: A public-key is a cryptographic system that uses pairs of keys, a public key which can be disseminated widely and a private key which is known only to the owner. It is commonly used for secure communication over insecure networks

How to use "public-key" in a sentence

Basic
Advanced
public-key
Public-key encryption for private individuals.
A system relying on a public-key infrastructure is used.
A public-key cipher uses a pair of keys for sending messages.
Digital signatures relying on public-key cryptography.
The key in public-key encryption is based on a hash value.
It is an alternative for implementing public-key cryptography.
Password or public-key based authentication.
It specifies a standard format for public-key certificates.
Public-key algorithms use a public key and a private key.
With or without an established public-key infrastructure.
Public-key algorithms are based on the computational difficulty of various problems.
They are crucial to public-key cryptography.
There are public-key schemes that are resistant to attack by quantum computers.
Enhance your products by supporting public-key infrastructures.
Public-key cryptosystems can also be used to create cryptographic signatures.

See also

Sony receives a public-key fueled enrollment request.
We open this manuscript introducing public-key cryptography.
Public-key cryptography is used in the invention in the following way.
The cryptoGPS scheme is a public-key authentication technique.
Public-key encryption hit the computer community like an explosion.
Thus it is an important part of the public-key infrastructure.
Public-key cryptography is a cryptographic method that assigns a user two keys.
The remaining issue is that of public-key authenticity.
Public-key cryptography is also used for implementing digital signature schemes.
The second mechanism uses public-key encryption.
A signature can be checked and verified using the corresponding public-key.
This assumes the use of a public-key encryption algorithm.
Techniques with no disclosure of knowledge are the logical conclusion of public-key algorithms.
Some newer software tokens rely on public-key cryptography, or asymmetric cryptography.
It is useful in computer science, especially in the field of public-key cryptography.
Optionally it may use public-key cryptography during certain phases of authentication.
The security of the network is provided by public-key cryptography.
It works by using a public-key cipher to share a key for the symmetric cipher.
Cellular automata have been proposed for public-key cryptography.
It was recalled that a public-key infrastructure was often based on various hierarchical levels of authority.
So this was kind of the starting point of public-key cryptography.
The effectiveness of public-key cryptography really rests on that of number theoretic algorithms.
This book examines multiple aspects of public-key cryptography.
An analogy to public-key encryption is that of a locked mail box with a mail slot.
This approach is called asymmetric cryptography or public-key cryptography.
We propose a new construction for a public-key cryptosystem, which is presented in two versions.
Electronic signatures relying on techniques other than public-key cryptography.
Public-key cryptosystems use two keys to solve the key transport problem.
Documents may also be encrypted without using public-key cryptography.
Another alternative to public-key cryptography for key exchange is quantum key-distribution.
Authentication over the wire happens using public-key cryptography.
Public key infrastructure provides public-key encryption and digital signature services.
There is a difference between transaction privacy and public-key privacy.
The ElGamal system is a public-key cryptosystem based on the discrete logarithm problem.
Symmetric key cryptography is much simpler than public-key cryptography.

Search by letter in the English dictionary