-
1 divide-and-conquer attack
- криптоанализ методом "разделяй и властвуй"
криптоанализ методом "разделяй и властвуй"
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > divide-and-conquer attack
-
2 divide and conquer attack
атака типа "разделяй и властвуй"Англо-русский словарь по компьютерной безопасности > divide and conquer attack
-
3 divide-and-conquer attack
атака методом "разделяй и властвуй", атака методом выделения нерешённых проблемEnglish-Russian electronics dictionary > divide-and-conquer attack
-
4 divide-and-conquer attack
атака методом "разделяй и властвуй", атака методом выделения нерешённых проблемThe New English-Russian Dictionary of Radio-electronics > divide-and-conquer attack
-
5 attack
1) нападение; атака, реализация угрозы2) действие нарушителя по перехвату информации; злонамеренное (воз) действие3) криптоанализ; метод криптоанализа (см. тж. cryptanalysis) -
6 attack
1) (агрессивное) (воз)действие среды || оказывать (агрессивное) действие ( о среде)2) коррозия || вызывать коррозию3) бомбардировка (напр. ионная) бомбардировать (напр. ионами)4) вчт атака (1. внезапные согласованные действия группы лиц с целью несанкционированного проникновения в защищённую систему или сеть 2. попытка злоумышленника нарушить нормальный ход информационного процесса 3. начало музыкальной фразы 4. манера исполнения начала музыкальной фразы) || атаковать•- adaptive chosen plaintext attack
- algebraic attack
- birthday attack
- brute force attack
- chemical attack
- chosen key attack
- chosen plaintext attack
- chosen text attack
- ciphertext only attack
- codebook attack
- correlation attack
- cryptoanalytic attack
- defined ciphertext attack
- deposit attack
- dictionary attack
- differential cryptoanalysis attack
- divide-and-conquer attack
- Einstein-Podolsky-Rosen attack
- electrolytic attack
- electronic attack
- EPR attack
- exhaustive key search attack
- fault analysis attack
- formal coding attack
- hacker attack
- hash attack
- key authentication attack
- key schedule attack
- known plaintext attack
- linear cryptoanalysis attack
- man-in-the-middle attack
- meet-in-the-middle attack
- MITM attack
- replay attack
- timing attack -
7 attack
1) (агрессивное) (воз)действие среды || оказывать (агрессивное) действие ( о среде)2) коррозия || вызывать коррозию3) бомбардировка (напр. ионная) бомбардировать (напр. ионами)4) вчт. атака (1. внезапные согласованные действия группы лиц с целью несанкционированного проникновения в защищённую систему или сеть 2. попытка злоумышленника нарушить нормальный ход информационного процесса 3. начало музыкальной фразы 4. манера исполнения начала музыкальной фразы) || атаковать•- adaptive chosen plaintext attack
- algebraic attack
- birthday attack
- brute force attack
- chemical attack
- chosen key attack
- chosen plaintext attack
- chosen text attack
- ciphertext only attack
- codebook attack
- correlation attack
- cryptoanalytic attack
- defined ciphertext attack
- deposit attack
- dictionary attack
- differential cryptoanalysis attack
- divide-and-conquer attack
- Einstein-Podolsky-Rosen attack
- electrolytic attack
- electronic attack
- EPR attack
- exhaustive key search attack
- fault analysis attack
- formal coding attack
- hacker attack
- hash attack
- key authentication attack
- key schedule attack
- known plaintext attack
- linear cryptoanalysis attack
- man-in-the-middle attack
- meet-in-the-middle attack
- MITM attack
- replay attack
- timing attackThe New English-Russian Dictionary of Radio-electronics > attack
См. также в других словарях:
Divide and Conquer (newsreel) — Why We Fight: Divide and Conquer One of the animated sequences of the film Directed by Frank Capra Anatole Litvak … Wikipedia
List of terms relating to algorithms and data structures — The [http://www.nist.gov/dads/ NIST Dictionary of Algorithms and Data Structures] is a reference work maintained by the U.S. National Institute of Standards and Technology. It defines a large number of terms relating to algorithms and data… … Wikipedia
Correlation attack — In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the output of several linear feedback shift registers (called LFSRs for the rest of this article)… … Wikipedia
United Electrical, Radio and Machine Workers of America — Infobox Union name= UE country= United States affiliation= Independent, ICEM, PSI members= 35,000 full name= United Electrical, Radio and Machine Workers of America native name= founded= 1936 current= head= dissolved date= dissolved state= merged … Wikipedia
Command & Conquer: Tiberian series — The Global Defense Initiative s iconic Ion Cannon orbital weapon The Command Conquer: Tiberian series is a sub series of real time strategy video games belonging to the extensive Command Conquer franchise by Westwood Studios and Electronic Arts.… … Wikipedia
Command & Conquer 3: Tiberium Wars — For the related novel, see Command Conquer: Tiberium Wars (novel). CNC3 redirects here. For the Canadian airport with the location identifier, see Brampton Airport. For the television station serving Trinidad and Tobago, see CNC3 Television.… … Wikipedia
HISTORICAL SURVEY: THE STATE AND ITS ANTECEDENTS (1880–2006) — Introduction It took the new Jewish nation about 70 years to emerge as the State of Israel. The immediate stimulus that initiated the modern return to Zion was the disappointment, in the last quarter of the 19th century, of the expectation that… … Encyclopedia of Judaism
List of Mighty Morphin Power Rangers monsters (Season Three) — During the third season of Mighty Morphin Power Rangers , Rita Repulsa and Lord Zedd made monsters together (occasionally with Finster s assistance). During the latter part of the season, Master Vile did as well.To make a monster grow, Zedd would … Wikipedia
Major houses in A Song of Ice and Fire — The following is a list of the notable characters in George R. R. Martin s A Song of Ice and Fire series of epic fantasy novels, belonging to one of the major aristocratic houses of fictional Westeros, and explains in detail what happens to these … Wikipedia
Mongol military tactics and organization — The Mongol military tactics and organization helped the Mongol Empire to conquer nearly all of continental Asia, the Middle East and parts of eastern Europe. In many ways, it can be regarded as the first modern military system. The original… … Wikipedia
Mill, John Stuart: Logic and metaphysics — J.S.Mill Logic and metaphysics John Skorupski ENLIGHTENMENT AND ROMANTICISM IN MILL’S PHILOSOPHY Mill’s importance as one of the major figures of nineteenth century politics and culture, and the current interest in him as a moral and political… … History of philosophy