{"component": "definition", "props": {"groups": [{"snippet_links": [{"key": "means-and-methods", "type": "definition", "offset": [52, 69]}, {"key": "in-order-to", "type": "clause", "offset": [101, 112]}, {"key": "unauthorized-use", "type": "definition", "offset": [194, 210]}, {"key": "of-information", "type": "definition", "offset": [260, 274]}, {"key": "key-management", "type": "definition", "offset": [352, 366]}], "samples": [{"hash": "3tE1v5PGljk", "uri": "https://assets.publishing.service.gov.uk/media/682b501f256994af4172ac03/uk_export_control_list_2025.pdf", "label": "assets.publishing.service.gov.uk", "score": 19.3160820007, "published": false}, {"hash": "59vo1NvZ9dU", "uri": "https://www.esu.ulg.ac.be/wp-content/uploads/2021/03/RECAST-FInal-agreement-18-November-2020.pdf", "label": "www.esu.ulg.ac.be", "score": 11.0410680771, "published": false}, {"hash": "lsdtS0UcYqV", "uri": "https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1052560/uk-strategic-export-control-lists.pdf", "label": "assets.publishing.service.gov.uk", "score": 10.7111568451, "published": false}], "size": 68, "snippet": "(5) means the discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorized use. \"Cryptography\" is limited to the transformation of information using one or more 'secret parameters' (e.g., crypto variables) or associated key management.", "hash": "fb23075716c9b230801d7641f1a0d13f", "id": 1}, {"snippet_links": [{"key": "the-principles", "type": "clause", "offset": [6, 20]}, {"key": "in-order-to", "type": "clause", "offset": [70, 81]}, {"key": "unauthorised-use", "type": "definition", "offset": [163, 179]}, {"key": "of-information", "type": "definition", "offset": [218, 232]}, {"key": "for-example", "type": "clause", "offset": [270, 281]}, {"key": "key-management", "type": "definition", "offset": [315, 329]}], "samples": [{"hash": "dCv2BW9yuhE", "uri": "/contracts/dCv2BW9yuhE#cryptography", "label": "Digital Economy Agreement", "score": 34.1474189758, "published": true}, {"hash": "57ha98qTPbL", "uri": "/contracts/57ha98qTPbL#cryptography", "label": "Digital Economy Agreement", "score": 26.3086929321, "published": true}, {"hash": "jYjArV0PApv", "uri": "/contracts/jYjArV0PApv#cryptography", "label": "Digital Economy Agreement", "score": 26.29637146, "published": true}], "size": 11, "snippet": "means the principles, means or methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorised use; and is limited to the transformation of information using one or more secret parameters, for example, crypto variables, or associated key management", "hash": "857bc75c7564cea3d9e2453f750f8e1d", "id": 2}, {"snippet_links": [{"key": "secret-code", "type": "definition", "offset": [53, 64]}, {"key": "of-information", "type": "definition", "offset": [120, 134]}], "samples": [{"hash": "fIhbW50EzUo", "uri": "https://l-amutual.com/wp-content/uploads/2024/03/PP-1705-0124-Residential-Condo-Unit-Owners-Comprehensive-Policy.pdf", "label": "l-amutual.com", "score": 18.9313755035, "published": false}, {"hash": "86IIhMLuz3B", "uri": "https://l-amutual.com/wp-content/uploads/2024/03/PP-1703-0124-Residential-Homeowners-Comprehensive-Policy-with-cover-page.pdf", "label": "l-amutual.com", "score": 18.8927364349, "published": false}, {"hash": "eYhLtC6CoCF", "uri": "https://l-amutual.com/wp-content/uploads/2024/03/PP-1702-0124-Residential-Homeowners-Broad-Poilicy-with-Cover-Page.pdf", "label": "l-amutual.com", "score": 18.8927364349, "published": false}], "size": 10, "snippet": "means the enciphering and deciphering of messages in secret code or cipher, also the computerized encoding and decoding of information.", "hash": "b0ae1d3ef4292786f4c3b520b61dccf8", "id": 3}, {"snippet_links": [{"key": "the-practice", "type": "clause", "offset": [6, 18]}, {"key": "to-ensure", "type": "clause", "offset": [41, 50]}], "samples": [{"hash": "3rldpU0xrlN", "uri": "https://apps.legislature.ky.gov/recorddocuments/bill/25RS/HB701/HCS1.pdf", "label": "apps.legislature.ky.gov", "score": 17.0283794403, "published": false}, {"hash": "94Emy4IrkTq", "uri": "https://apps.legislature.ky.gov/recorddocuments/bill/25RS/hb701/bill.pdf", "label": "apps.legislature.ky.gov", "score": 17.0083122253, "published": false}, {"hash": "3PRyU23jArB", "uri": "https://apps.legislature.ky.gov/recorddocuments/bill/25RS/hb701/orig_bill.pdf", "label": "apps.legislature.ky.gov", "score": 16.9638843536, "published": false}], "size": 6, "snippet": "means the practice of coding information to ensure only the", "hash": "2f1804db64ad2a93e0d7acd12cdeef0d", "id": 4}, {"snippet_links": [{"key": "the-principles", "type": "clause", "offset": [6, 20]}, {"key": "in-order-to", "type": "clause", "offset": [71, 82]}, {"key": "unauthorised-use", "type": "definition", "offset": [168, 184]}, {"key": "of-information", "type": "definition", "offset": [223, 237]}, {"key": "for-example", "type": "clause", "offset": [275, 286]}, {"key": "key-management", "type": "definition", "offset": [319, 333]}], "samples": [{"hash": "cIstxFrpmb2", "uri": "https://www.mfat.govt.nz/assets/Trade-agreements/UK-NZ-FTA/Chapters/Chapter-15-Digital-Trade.pdf", "label": "www.mfat.govt.nz", "score": 8.0821352005, "published": false}, {"hash": "8PZwOuMU6sb", "uri": "https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1057192/uk-new-zealand-free-trade-agreement-chapter-15-digital-trade.pdf", "label": "assets.publishing.service.gov.uk", "score": 8.0739221573, "published": false}], "size": 5, "snippet": "means the principles, means, or methods for the transformation of data in order to conceal or disguise its content, prevent its undetected modification, or prevent its unauthorised use, and is limited to the transformation of information using one or more secret parameters, for example, crypto variables or associated key management;", "hash": "4ade4d7ed69e9558b490a250b141a475", "id": 5}, {"snippet_links": [{"key": "of-information", "type": "definition", "offset": [33, 47]}, {"key": "key-management", "type": "definition", "offset": [125, 139]}], "samples": [{"hash": "eSeyM2FIJwQ", "uri": "/contracts/eSeyM2FIJwQ#cryptography", "label": "Proposal for a Regulation", "score": 31.8810367584, "published": true}, {"hash": "5vbZhAXZf95", "uri": "/contracts/5vbZhAXZf95#cryptography", "label": "Proposal for a Regulation", "score": 31.8810367584, "published": true}, {"hash": "lA0aZwWPZRs", "uri": "/contracts/lA0aZwWPZRs#cryptography", "label": "Definitions Document", "score": 26.5167694092, "published": true}], "size": 4, "snippet": "is limited to the transformation of information using one or more 'secret parameters' (e.g., crypto variables) or associated key management.", "hash": "5954825076ae361335c9d23a8302a5b8", "id": 6}, {"snippet_links": [{"key": "method-of", "type": "clause", "offset": [10, 19]}], "samples": [{"hash": "hOhyGIeQYeE", "uri": "https://malawilii.org/akn/mw/act/2016/33/eng@2017-12-31/source.pdf", "label": "Electronic Transaction", "score": 16.0691299438, "published": false}, {"hash": "h5NZoAhUFoi", "uri": "https://media.malawilii.org/files/legislation/akn-mw-act-2016-33-eng-2017-12-31.pdf", "label": "Electronic Transaction", "score": 15.2409305573, "published": false}, {"hash": "1iiVMO02slY", "uri": "https://media2.mofo.com/documents/e-transactions-act-2016.pdf", "label": "media2.mofo.com", "score": 6.5167694092, "published": false}], "size": 4, "snippet": "means the method of storing and transmitting data by transferring it into unreadable format so that only those for whom it is intended can process and read it;", "hash": "73e693cc34636c58327f8812aecf71e7", "id": 7}, {"snippet_links": [{"key": "with-reference-to", "type": "clause", "offset": [7, 24]}, {"key": "computer-science", "type": "clause", "offset": [25, 41]}, {"key": "the-process", "type": "clause", "offset": [74, 85]}, {"key": "transaction-information", "type": "clause", "offset": [142, 165]}], "samples": [{"hash": "7Drv6lXLKy8", "uri": "https://webfiles.thecse.com/sedar_filings/00037302/1811011322269665.pdf", "label": "Note", "score": 13.4120464325, "published": false}, {"hash": "kiMMjueXeqP", "uri": "https://sedar-filings.thecse.com/00037302/1810121357038858.pdf", "label": "sedar-filings.thecse.com", "score": 9.3668718338, "published": false}, {"hash": "5C0wWM2Md5J", "uri": "https://sedar-filings-backup.thecse.com/00037302/1808301543000341.pdf", "label": "sedar-filings-backup.thecse.com", "score": 8.329911232, "published": false}], "size": 3, "snippet": "means, with reference to computer science, blockchain and cryptocurrency, the process (known as encryption) of rendering converting financial transaction information into unintelligible text (known as ciphertext) and converting ciphertext into readable text (known as decryption).", "hash": "a1cb521e7988cfb9bed74612b8d8af29", "id": 8}, {"snippet_links": [{"key": "protecting-information", "type": "clause", "offset": [17, 39]}], "samples": [{"hash": "7YgOzw7qI7u", "uri": "https://elibrary.osg.go.tz/bitstream/handle/123456789/933/13SHERIA-THE%20ELECTRONIC%20TRANSACTIONS%20ACT%20-%20FINAL.pdf?sequence=1&isAllowed=y", "label": "Electronic Transaction", "score": 14.5838022232, "published": false}, {"hash": "2dYnHGP5b87", "uri": "https://media.tanzlii.org/media/legislation/319051/source_file/c3280e17fb5b1e6a/tz-act-2015-13-publication-document.pdf", "label": "Electronic Transaction", "score": 14.0069580078, "published": false}, {"hash": "3ljYz13MDTI", "uri": "https://www.velmalaw.co.tz/wp-content/uploads/2016/11/Electronic-Transactions-Act-2015.pdf", "label": "Electronic Transaction", "score": 13.2286109924, "published": false}], "size": 3, "snippet": "means the art of protecting information by transforming it into an unreadable format;", "hash": "1868a4c9a9f3106993e285f00ce6637e", "id": 9}, {"snippet_links": [{"key": "method-of", "type": "clause", "offset": [10, 19]}, {"key": "protecting-information", "type": "clause", "offset": [20, 42]}, {"key": "the-information", "type": "clause", "offset": [59, 74]}], "samples": [{"hash": "jhbPqzTdht4", "uri": "https://zambialii.org/akn/zm/act/2021/4/eng@2021-03-24/source.pdf", "label": "zambialii.org", "score": 11.9295005798, "published": false}, {"hash": "d8PBG0uLIIl", "uri": "https://www.dataguidance.com/sites/default/files/act_no._4_of_2021_the_electronic_communications_and_transactions_0_0.pdf", "label": "www.dataguidance.com", "score": 8.6194391251, "published": false}], "size": 3, "snippet": "means the method of protecting information by transforming the information into unreadable format;", "hash": "208c3f58d3b38b454b852a77c169fa0c", "id": 10}], "next_curs": "ClkSU2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjULEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIVY3J5cHRvZ3JhcGh5IzAwMDAwMDBhDKIBAmVuGAAgAA==", "definition": {"title": "Cryptography", "size": 138, "snippet": "(5) means the discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorized use. \"Cryptography\" is limited to the transformation of information using one or more 'secret parameters' (e.g., crypto variables) or associated key management.", "id": "cryptography", "examples": ["The BlackBerry Handheld Software may include software modules that allow users to extend certain of their existing desktop-based <strong>cryptography</strong> implementations (such as S/MIME Version 3.0 (or subsequent) or implementations based on the RFC 2440 standards, such as PGP) (each a &quot;Desktop <strong>Cryptography</strong> Implementation&quot;) wirelessly to certain Handheld Products.", "You are responsible for ensuring that You comply with any terms and conditions, rules and regulations respecting Your use of the applicable <strong>cryptography</strong> infrastructure, certificates, public keys, and any other services or software You may use in conjunction with Your particular Desktop <strong>Cryptography</strong> Implementation.", "Certain Desktop <strong>Cryptography</strong> Implementations may require you to first obtain such Desktop <strong>Cryptography</strong> Implementations from a third party vendor.", "Public Key <strong>Cryptography</strong>: A type of <strong>cryptography</strong> (a process of creating and deciphering communications to keep them secure) that uses a Key Pair to securely encrypt and decrypt messages.", "This algorithm can be applied for the computation of RSA [2] and Elliptic Curve <strong>Cryptography</strong> (ECC) [3] with prime field operations.", "<strong>Cryptography</strong> Cryptographic algorithms: Only Telstra approved algorithms may be used, and Telstra requires that system configuration support is removed for all weak, non-approved algorithms.", "With regard to electronic PHI not covered by the Guidance published at 74 FR 19006, the Associate will protect electronic PHI at rest and in transit through encryption that complies with State of Ohio IT Standard, ITS-SEC-01 Data Encryption and <strong>Cryptography</strong>.", "In Financial <strong>Cryptography</strong> and Data Security, \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 (Eds.).", "Lessee shall pay to Lessor during the term hereof, in addition to the Base Rent, Lessee&#x27;s Share (as specified in Paragraph 1.", "Any controversy or claim arising out of or relating to this Agreement or the breach thereof, shall exclusively be settled by the International Arbitration and <strong>Cryptography</strong> Centre Limited (hereinafter \u2013 \u201cIACC\u201d)."], "related": [["radiography", "Radiography", "Radiography"], ["cabinet-radiography", "Cabinet radiography", "Cabinet radiography"], ["diagnostic-mammography", "Diagnostic mammography", "Diagnostic mammography"], ["mammography", "Mammography", "Mammography"], ["images", "Images", "Images"]], "related_snippets": [], "updated": "2025-07-24T04:27:56+00:00"}, "json": true, "cursor": ""}}