encryption scheme

collocation in English

meaningsofencryptionandscheme

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withscheme.
encryption
noun[U]
uk
/ɪnˈkrip.ʃən/
us
/ɪnˈkrip.ʃən/
the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ...
See more atencryption
scheme
noun[C]
uk
/skiːm/
us
/skiːm/
an organized plan for doing something, especially something dishonest or illegal that will bring a good result ...
See more atscheme

(Definition ofencryptionandschemefrom theCambridge English Dictionary© Cambridge University Press)

Examplesofencryption scheme

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
There are ongoing maintenance procedures which are a requirement of anyencryptionscheme.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
For technical reasons, anencryptionschemeusually uses a pseudo-random encryption key generated by an algorithm.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The homomorphic part of a fully homomorphicencryptionschemecan also be described in terms of category theory.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The goal of the attack is to gain some further information which reduces the security of theencryptionscheme.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The homomorphic properties of theencryptionschemeenable the worker to obtain an encryption of the correct output wire.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These communicate over a network, using a uniqueencryptionschemefor stealth and protection against detection or intrusion into the botnet.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In a secure asymmetric keyencryptionscheme, the private key should not be deducible from the public key.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Finally, he shows that any bootstrappable somewhat homomorphicencryptionschemecan be converted into a fully homomorphic encryption through a recursive self-embedding.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A questionableencryptionschemehas the property that real public keys are computationally indistinguishable from fake public keys when the private key is not available.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This period represents more than enough time for theencryptionschemeto be defeated by determined attackers.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Informally speaking, a questionableencryptionschemeis a public key cryptosystem (3-tuple of algorithms) with two supplementary algorithms, forming a 5-tuple of algorithms.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In 2007 theencryptionschemewas overcome with a tool called "dvdcpxm".
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
To use a symmetricencryptionscheme, the sender and receiver must securely share a key in advance.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In anencryptionscheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
An intuitive approach to converting a deterministicencryptionschemeinto a probabilistic one is to simply pad the plaintext with a random string before encrypting with the deterministic algorithm.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Assuming that a deterministicencryptionschemeis going to be used, it is important to understand what is the maximum level of security that can be guaranteed.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Note that secure here has a precise mathematical meaning, and there are multiple different (meaningful) definitions of what it means for anencryptionschemeto be secure.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
It is in principle possible to decrypt the message without possessing the key, but, for a well-designedencryptionscheme, large computational resources and skill are required.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofencryption
Go to the definition ofscheme
See other collocations withscheme