Public-key cryptographic algorithms also can be used to append nonreputable mathematic^([sic]) hashes of the packets, providing the receiver with good assurance that they are receiving valid data.
Source: wiktionary
Ranked by relevance and common usage.
OpenGloss and ConceptNet supply richer edges like generalizations, collocations, and derivations.
1 total sentences available.
Public-key cryptographic algorithms also can be used to append nonreputable mathematic^([sic]) hashes of the packets, providing the receiver with good assurance that they are receiving valid data.
Source: wiktionary
Data sourced from Wiktionary, WordNet, CMU, and other open linguistic databases. Updated March 2026.