-
1 forward search cryptanalysis
Безопасность: криптоанализ с поиском вперёд, криптоанализ с просмотром вперёдУниверсальный англо-русский словарь > forward search cryptanalysis
-
2 forward search cryptanalysis
Англо-русский словарь по компьютерной безопасности > forward search cryptanalysis
-
3 cryptanalysis
криптоанализ; конкретное применение криптоанализа; анализ зашифрованного текста, дешифрованиеАнгло-русский словарь по компьютерной безопасности > cryptanalysis
См. также в других словарях:
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
international relations — a branch of political science dealing with the relations between nations. [1970 75] * * * Study of the relations of states with each other and with international organizations and certain subnational entities (e.g., bureaucracies and political… … Universalium
Attack on Pearl Harbor — Part of the Pacific Theater of World War II … Wikipedia
Timeline of computing hardware 2400 BC–1949 — History of computing Hardware before 1960 Hardware 1960s to present Hardware in Soviet Bloc countries Artificial intelligence Computer science Operating systems Programming languages … Wikipedia
Deniable encryption — In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it[citation needed]. Such convincing denials may or may not be genuine.… … Wikipedia
Meet-in-the-middle attack — Not to be confused with man in the middle attack. The meet in the middle attack is a cryptographic attack which, like the birthday attack, makes use of a space time tradeoff. While the birthday attack attempts to find two values in the domain of… … Wikipedia
Battle of Midway — Part of the Pacific Theater of World War II … Wikipedia
CHAOS (Linux distribution) — infobox OS name = CHAOS caption = CHAOS 1.6 Boot Welcome Screen developer = Midnight Code / Ian Latter family = Linux source model = Open source latest release version = 1.6 latest release date = April 2005] working state = Currentcite web |… … Wikipedia
Swarming (military) — Swarming is a behavior in which autonomous, or semi autonomous, units of action attack an enemy from several different directions and then regroup. Pulsing , where the units shift the point of attack, is a necessary part of swarming. Swarming is… … Wikipedia