DictionaryForumContacts

Terms containing public-key | all forms | exact matches only | in specified order only
SubjectEnglishDanish
comp., MSpublic keyoffentlig nøgle (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
comp., MSpublic key algorithmalgoritme til offentlig nøgle (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
commun., ITpublic key algorithmoffentlig nøglealgoritme
comp., MSpublic key algorithmasymetrisk algoritme (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
ITpublic key cryptographyasymmetrisk system
ITpublic key cryptographyto-nøgle system
commun., ITpublic key cryptographypublic key-krypteringssystem
commun., ITpublic key cryptographypublic key-kryptering
commun., ITpublic key cryptographyoffentlig nøgle-kryptering
ITpublic key cryptographykryptografi,der benytter offentlig nøgle
ITpublic key cryptographykryptosystem med offentlig nøgle
ITpublic key cryptographypublic key system
ITpublic key cryptographyasymmetrisk kryptosystem
ITpublic key cryptosystem"Public key" kodesystem
gen.public key data confidentialitydatafortrolighed ved hjælp af offentlig nøgle
ITpublic key enciphermentkryptografi,der benytter offentlig nøgle
ITpublic key enciphermentkryptosystem med offentlig nøgle
ITpublic key enciphermentpublic key system
ITpublic key enciphermentasymmetrisk system
ITpublic key enciphermentto-nøgle system
ITpublic key enciphermentasymmetrisk kryptosystem
commun., ITpublic key encryptionasymmetrisk kryptering
comp., MSpublic key encryptionkryptering ved hjælp af offentlig nøgle (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSpublic key infrastructurePKI public key infrastructure, infrastruktur for offentlige nøgler (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce)
comp., MSPublic Key Infrastructure certificate A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transactionPublic Key Infrastructure-certifikat (PKI-certifikat)
construct., ITPublic sector information: a key resource for Europe - Green Paper on public sector information in the information societyInformation i den offentlige sektor: en vigtig ressource for Europa - grønbog om information i den offentlige sektor i informationssamfundet
ITRivest, Shamir and Adleman public-key encryption algorithmRivest, Shamir og Adleman
ITRSA public-key encryption algorithmRivest, Shamir og Adleman

Get short URL