-
1 Crypto-Gram
prop "Крипто-Грамма" {ежемесячный криптологический информационный бюллетень, распространяемый в электронном виде среди пользователей глобальной компьютерной сети "Интернет"). -
2 крипто-грамма
крипто-грамма
Ежемесячный криптологический информационный бюллетень, распространяемый в электронном виде среди пользователей Интернета.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > крипто-грамма
См. также в других словарях:
Crypto AG — Website http://www.crypto.ch/ Crypto AG is a Swiss company specialising in communications and information security. With headquarters in Steinhausen, the company is a long established manufacturer of encryption machines and a wide variety of… … Wikipedia
Full disclosure — In computer security, full disclosure means to disclose all the details of a security problem which are known. It is a philosophy of security management completely opposed to the idea of security through obscurity. The concept of full disclosure… … Wikipedia
XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… … Wikipedia
Bruce Schneier — infobox scientist name = Bruce Schneier birth date = Birth date and age|1963|1|15|df=y residence = citizenship = field = Computer science work institutions = Counterpane Internet Security Bell Labs United States Department of Defense BT Group… … Wikipedia
Security theater — consists of security countermeasures intended to provide the feeling of improved security while doing little or nothing to actually improve security. [cite book last = Schneier first = Bruce authorlink = Bruce Schneier title = Beyond Fear:… … Wikipedia
Шнайер, Брюс — Брюс Шнайер Bruce Schneier … Википедия
Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… … Wikipedia
Snake oil (cryptography) — Distinguishing secure cryptography from insecure cryptography can be difficult from the viewpoint of a user. Many cryptographers, such as Bruce Schneier and Phil Zimmermann, undertake to educate the public in how secure cryptography is done, as… … Wikipedia
Cramer-Shoup cryptosystem — The Cramer Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the… … Wikipedia
Impossible differential cryptanalysis — In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia