| 1. | Cryptographic technique applied in network testing system 的网络测试系统中的应用 |
| 2. | The new ltpa token uses the following strong cryptographic techniques 新的ltpa令牌使用以下强加密技术: |
| 3. | Data cryptographic techniques - procedures for the registration of cryptographic algorithms 数据加密技术.加密算法的注册程序 |
| 4. | Data cryptographic techniques . procedures for the registration of cryptographic algorithms 数据密码技术.密码算法的登记程序 |
| 5. | Information technology - security techniques - cryptographic techniques based on elliptic curves - general 信息技术.安全技术.基于椭圆曲线的密码技术.总则 |
| 6. | Information technology - security techniques - cryptographic techniques based on elliptic curves - digital signatures 信息技术.安全技术.基于椭圆曲线的密码技术.数字签名 |
| 7. | Information technology - security techniques - cryptographic techniques based on elliptic curves - part 1 : general 信息技术.保密技术.基于椭圆曲线的密码技术.第1部分:总则 |
| 8. | Information technology - security techniques - cryptographic techniques based on elliptic curves - key establishment 信息技术.安全技术.基于椭圆曲线的密码技术.密钥匙的确定 |
| 9. | Information technology - security techniques - cryptographic techniques based on elliptic curves - part 2 : digital signatures 信息技术.保密技术.基于椭圆曲线的密码技术.第2部分:数字签名 |
| 10. | Information technology - security techniques - cryptographic techniques based on elliptic curves - part 3 : key establishment 信息技术.保密技术.基于椭圆曲线的密码技术.第3部分:密钥的建立 |