Subject | English | Dutch |
IT | cryptography policy | versleutelingsbeleid |
IT | cryptography policy | coderingsbeleid |
comp., MS | elliptic curve cryptography | cryptografie met behulp van elliptische krommen (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases) |
IT | public key cryptography | asymmetrisch encryptie-algoritme |
IT | public key cryptography | openbaar versleuteld systeem |
IT | public key cryptography | public key cryptosysteem |
comp., MS | symmetric-key cryptography | symmetrische-sleutelcryptografie (A type of cryptography that uses symmetric keys to provide confidentiality) |