All Adverb Noun
171 examples (0.03 sec)
  • A cryptographically strong prime has to be much larger than this example.
  • For these other primitives to be cryptographically secure, care has to be taken to build them the right way.
  • Note: random numbers transferred over the public internet are not cryptographically secure for most purposes.
  • This was the first time a public sector election was run using any cryptographically verifiable voting system.
  • A computationally large safe prime is likely to be a cryptographically strong prime.
  • Other related names have been given to cryptographically important classes of functions, such as almost bent functions and crooked functions.
  • For these other primitives to be cryptographically secure, care must be taken to build them correctly.
  • However most modern operating systems offer cryptographically strong random number generators that are suitable for password generation.
  • As with all protocols, to be cryptographically secure, care must be taken to build them correctly.
  • The random selection is cryptographically secure -- it cannot be influenced by any of the parties.
  • It is considered to be far too cryptographically weak to provide any security against brute force attacks by modern, commodity personal computers.
  • The algorithm in its native form is not cryptographically secure.
  • As a general rule, any software except a Cryptographically secure pseudorandom number generator should be avoided.
  • The design of cryptographically adequate PRNGs is extremely difficult, because they must meet additional criteria (see below).
  • The client contains many cryptographically secured key pairs and can use these automatically sign requests for session management or membership of any network service.
  • Therefore either a source of truly random numbers or a cryptographically secure pseudo-random number generator is required.
  • The message includes a time-sensitive cryptographically secure cookie to prevent servers from being listed by mistake.
  • Advanced bots may use cryptographically signed updates to make sure the update is authentic.
  • Unix-like systems typically include other commands for cryptographically secure checksums, such as sha1sum.
  • Within the protocol stack, different network layers are not cryptographically separated, so access policies are needed and correct design assumed.
  • Next »

Meaning of cryptographically

  • adverb In a cryptographic manner