Conventional secret sharing schemes need knowledge of cryptography and cryptographic computations .
传统的秘密分享机制需要密码学及密码计算的知识。
We ll also provide links to other cryptographic packages believed to be robust .
我们还将提供其他被认为是很健壮的密码套装软体的连结。
Fortunately , cryptographic techniques already exist to secure messages from one ubiquitous computer to another and to safeguard private information stored in networked systems .
This consideration particularly holds true for cryptographic libraries .
对于密码库,这种考虑尤其适用。
Corrigendum 1 - information technology -- security techniques -- security requirements for cryptographic modules .
勘误表1---信息技术---安全性技术---密码模块的安全性要求。
Unlike other outlets , we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies .
和其他媒体不同的是,我们提供一个高度安全的匿名泄密箱,这些信息箱绑定了尖端的加密信息技术。
Select a cryptographic service provider .
选定一个加密服务提供程序。
Rather than revealing a mobile device 's owner to service providers , one way to ensure anonymity is for a mobile device to ping services using a cryptographic proof-of-identity .