Translation of "cryptographic primitives" to Japanese language:
Dictionary English-Japanese
Examples (External sources, not reviewed)
Finite Solid Primitives | 有限単体プリミティブ |
Finite Patch Primitives | 有限パッチプリミティブ |
Infinite Solid Primitives | 無限単体プリミティブ |
Infinite and Patch Primitives | 無限パッチプリミティブ |
Options Select Cryptographic Message Format | オプション メッセージを暗号化 |
It appears to be made up of primitives. | 敵は原始人どもの寄せ集めです |
In, say, computer graphics, you need the computational primitives that are supplied by the study of geometric algorithms. | 演算単位が必要です データベースのインデックスはbalance search treeに依存してて |
There are only three basic primitives we ever send to the graphics processing unit, points, line segments and triangles. | 点と線分と三角形です この中で重要なのが三角形で 例えば3Dゲームで目にするものは すべて究極的には三角形で構成されています |
So what you can really think cryptographic hash functions as, is perhaps maybe the mathematical equivalent analog of a meat grinder. | 入力を受け取って数学的に変形させるわけですね |
cryptographic hash functions are basically fundamental building blocks that are used within many cryptographic algorithms amp amp protocols we have a number of very important applications in the context of information security as a whole now, some of the more common algorithms in this category, that are known as cryptographic hash functions, include things like MD5, amp amp also it has some predecessors like MD4 amp amp others as well as algorithms like | 暗号学的ハッシュ関数は基本的な要素であり 多くの暗号アルゴリズムやプロトコルで 必要になります 情報セキュリティの分野では非常に重要なものです |
For example, you may have heard of something like a hash function used to form a hash table but the kind of hash functions that are used in hash tables and I wanna stress this, they aren't necessarily the same as cryptographic hash functions the qualifier cryptographic here is very, very important. | しかしハッシュテーブルで使われているものは 暗号学的ハッシュ関数とは限りません 暗号学的であるには条件があるのです つまり暗号学的ハッシュの設計においては欠くことのできない要件があり |
There's no pyramid that conveniently places Victorian England at the apex and descends down the flanks to the so called primitives of the world. | ふもとの方に 原始的と呼ぶ人たちを 置くようなピラミッド型の階層もありません 全ての民族は単に文化の選択肢で |
So one possibility is that cryptographic protocols, so things were keeping secrets in encrypting data that are based on problems like factoring that are in NP could be cracked. | NPに属するプロトコルが クラッキングされてしまいます 2つ目の可能性は コンピュータ サイエンスの理論家です |
Then, I started drilling down, thinking about the computations I might want to do, trying to figure out what primitives they could be built up from and how they could be automated as much as possible. | やりたいと思う計算はどんなものか考え 計算を形作りうる基本要素は何か どこまで自動化することができるのかを見極めようとしました |
You could do them and see your assembly language or you could use this sort of domain specific language since it has notions of distributed computation where data lives, sending information back and forth, built in as primitives. | このようなドメイン特化言語なら 分散処理やデータの位置を探したり データを送受信したりといった処理を 組み込みの命令として使うことができますし |
There is no tool that gives you an alternative, and makes it easy if you're not a person who is good at setting up technology and figuring out what the most secure thing to do with a cryptographic key is. | 把握できなっかたら そうしたことを簡単に行うという 選択肢を与えてくれる物が 存在していないのです フリーダムボックスがそれです それを可能にするのが私達のプロジェクトです |
There is no tool that gives you an alternative, and makes it easy if you're not a person who is good at setting up technology and figuring out what the most secure thing to do with a cryptographic key is. | そしてあなたが機械音痴なら ますますそれを使うのが簡単だと感じるでしょう 暗号キーと共に使用すべき 最も確実なものが何なのか見えてきました それが FreedomBox です 私達がしようとしているのは つまりこのような事なのです |
let's say SHA 256, the digest will actually be exactly the 256 bits in length so it's gonna have a fixed length output but an arbitrary length input and the other thing I wanna point out about these cryptographic hash functions, is that the function is a deterministic function, amp amp by that I mean that the output will always be the same for a given input. | 入力の長さは任意ですが 出力は固定長なのです また暗号学的ハッシュの特徴としては 決定性のアルゴリズムであることが挙げられます 関数は同じ入力に対して 常に同じ結果を生成します |
Related searches : Geometric Primitives - Graphics Primitives - Communication Primitives - Service Primitives - Cryptographic Key - Cryptographic Algorithms - Cryptographic Hash - Cryptographic Library - Cryptographic Controls - Cryptographic Software - Cryptographic Module - Cryptographic Operations - Cryptographic Strength