-
1 attack by iteration
криптоанализ методом итераций
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > attack by iteration
-
2 attack by iteration
Англо-русский словарь по компьютерной безопасности > attack by iteration
-
3 attack
1) нападение; атака, реализация угрозы2) действие нарушителя по перехвату информации; злонамеренное (воз) действие3) криптоанализ; метод криптоанализа (см. тж. cryptanalysis) -
4 history
изменение (по времени); временная зависимость; график < по времени>; история < нагружения>; предысторияacceleration historyaerospace historyangle-of-attack historyangular rate historycase historycontrol historyenergy historyflight time historyiteration historylift time historyload historyload factor historymaneuver time historymass time historymotion historyoptimal control historyoscillation historypitch historypitch time historypressure historyresponse time historyroll angle time historyroll rate time historyroll time historystress historystructural historythrust time historytime historytorque history
См. также в других словарях:
Slide attack — The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number of rounds, which can ward off a differential attack. The slide attack works in such a way … Wikipedia
Timing Attack — Attaque temporelle En cryptanalyse, une attaque temporelle consiste à estimer et analyser le temps mis pour effectuer certaines opérations cryptographiques dans le but de découvrir des informations secrètes. Certaines opérations peuvent prendre… … Wikipédia en Français
криптоанализ методом итераций — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN attack by iteration … Справочник технического переводчика
Rainbow table — A rainbow table is a lookup table offering a time memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function. A common application is to make attacks against… … Wikipedia
Merkles Meta-Verfahren — (auch Merkle Damgård Konstruktion) ist eine Methode zur Konstruktion von kryptographischen Hash Funktionen. Gegeben ist eine Kompressionsfunktion , die kollisionssicher ist, d. h. es ist nicht mit realistischem Aufwand möglich, zwei… … Deutsch Wikipedia
Eve Online — Developer(s) CCP Games Publisher(s) CCP Games … Wikipedia
Key derivation function — KDF redirects here. For the Nazi organization, see Kraft durch Freude In cryptography, a key derivation function (or KDF) is a function which derives one or more secret keys from a secret value and/or other known information such as a password or … Wikipedia
ancient Greek civilization — ▪ historical region, Eurasia Introduction the period following Mycenaean civilization, which ended in about 1200 BC, to the death of Alexander the Great, in 323 BC. It was a period of political, philosophical, artistic, and scientific… … Universalium
Characters of Final Fantasy IX — The main playable characters of Final Fantasy IX, from left: Quina, Freya, Eiko, Garnet, Zidane, Steiner, Vivi, and Amarant. Fi … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia
Mizar chess engine — Mizar Developer(s) Nicola Rizzuti Stable release 3.0 / May 16, 2006 Written in C Operating system Windows … Wikipedia