This definition appears very rarely
and is found in the following Acronym Finder categories:
- Information technology (IT) and computers
See other meanings of PKE
We have 14 other definitions for PKE
in our Acronym Attic
Samples in periodicals archive:
Public key encryption is used to exchange the symmetric keys when a secure communication link is established.
Encryptek will unveil its new and patented Radium technology for acceleration of public key encryption at the annual RSA conference in San Francisco on 27 February, 2012.
Its main expertise resides in its public key encryption technology and its principal strength is in transforming this public key encryption technology into practical software applications, which feature automatic functions to protect sensible information.
RSA is the worldwide de facto standard for public key encryption and digital signatures, and is part of existing and proposed standards for the Internet, CCITT, ISO, ANSI, IEEE, and business and financial networks around the globe.
Technology partners can use the Hush Software Developer's Kit (SDK) to access the Hush Key Server Network, and easily integrate powerful public key encryption into their own software and services.
The new processor performs symmetric key encryption (DES, 3DES, ARC4), hashing operations (MD5, SHA-1) with or without HMAC, and public key encryption (RSA, DSA, and Diffie-Hellman exchanges).
GNU Privacy Guard (GnuPG) is a free software program that encrypts and decrypts e-mail messages using public key encryption technology.
Technology Partners can utilize the Hush SDK to access the Hush Key Server Network, and easily integrate powerful public key encryption into their own software and services.