encryption scheme
collocation in Englishmeaningsofencryptionandscheme
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withscheme.
encryption
noun[U]
uk/ɪnˈkrip.ʃən/us/ɪnˈkrip.ʃən/
the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ...
See more atencryption
scheme
noun[C]
uk/skiːm/us/skiːm/
an organized plan for doing something, especially something dishonest or illegal that will bring a good result ...
See more atscheme
(Definition ofencryptionandschemefrom theCambridge English Dictionary© Cambridge University Press)
Examplesofencryption scheme
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
There are ongoing maintenance procedures which are a requirement of anyencryptionscheme.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
For technical reasons, anencryptionschemeusually uses a pseudo-random encryption key generated by an algorithm.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The homomorphic part of a fully homomorphicencryptionschemecan also be described in terms of category theory.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The goal of the attack is to gain some further information which reduces the security of theencryptionscheme.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The homomorphic properties of theencryptionschemeenable the worker to obtain an encryption of the correct output wire.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These communicate over a network, using a uniqueencryptionschemefor stealth and protection against detection or intrusion into the botnet.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In a secure asymmetric keyencryptionscheme, the private key should not be deducible from the public key.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Finally, he shows that any bootstrappable somewhat homomorphicencryptionschemecan be converted into a fully homomorphic encryption through a recursive self-embedding.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A questionableencryptionschemehas the property that real public keys are computationally indistinguishable from fake public keys when the private key is not available.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
This period represents more than enough time for theencryptionschemeto be defeated by determined attackers.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Informally speaking, a questionableencryptionschemeis a public key cryptosystem (3-tuple of algorithms) with two supplementary algorithms, forming a 5-tuple of algorithms.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In 2007 theencryptionschemewas overcome with a tool called "dvdcpxm".
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
To use a symmetricencryptionscheme, the sender and receiver must securely share a key in advance.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In anencryptionscheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
An intuitive approach to converting a deterministicencryptionschemeinto a probabilistic one is to simply pad the plaintext with a random string before encrypting with the deterministic algorithm.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Assuming that a deterministicencryptionschemeis going to be used, it is important to understand what is the maximum level of security that can be guaranteed.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Note that secure here has a precise mathematical meaning, and there are multiple different (meaningful) definitions of what it means for anencryptionschemeto be secure.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
It is in principle possible to decrypt the message without possessing the key, but, for a well-designedencryptionscheme, large computational resources and skill are required.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofencryption
Go to the definition ofscheme
See other collocations withscheme