Subject | English | German |
IT | computational cryptography | computergeeignete Kryptographie |
IT | computational cryptography | algebraische Verschlüsselung |
comp., MS | Cryptography Application Programming Interface | Kryptografie-API (An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs)) |
comp., MS | elliptic curve cryptography | Kryptografie für elliptische Kurve (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases) |
IT | public key cryptography | asymmetrisches Kryptosystem |
IT | public key cryptography | asymmetrisches Verfahren |
commun., IT | public key cryptography | Public-Key-Verfahren |
commun., IT | public key cryptography | Public-Key-Verschlüsselung |
IT | public key cryptography | public key-System |
IT | public key cryptography | asymmetrische Blockchiffre |
IT, nat.sc. | quantum cryptography | Quantenkryptografie |
IT, nat.sc. | quantum cryptography | Quanten-Schlüsselaustausch |
phys. | quantum cryptography | Quantenkryptographie |
busin., IT | quantum cryptography | Quanten-Kryptografie |
comp., MS | symmetric-key cryptography | Kryptografie für symmetrische Schlüssel (A type of cryptography that uses symmetric keys to provide confidentiality) |