-
1 key-controlled algorithm
управляемый ключом алгоритм (шифрования)English-Russian cryptological dictionary > key-controlled algorithm
-
2 алгоритм (шифрования), управляемый ключом
алгоритм (шифрования), управляемый ключом
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > алгоритм (шифрования), управляемый ключом
-
3 управляемый ключом алгоритм (шифрования), зависящий от ключа алгоритм
Security: key-controlled algorithm (шифрования), key-dependent algorithm (шифрования)Универсальный русско-английский словарь > управляемый ключом алгоритм (шифрования), зависящий от ключа алгоритм
-
4 управляемый ключом алгоритм , зависящий от ключа алгоритм
Security: (шифрования) key-controlled algorithm (шифрования), (шифрования) key-dependent algorithm (шифрования)Универсальный русско-английский словарь > управляемый ключом алгоритм , зависящий от ключа алгоритм
См. также в других словарях:
Algorithm — Flow chart of an algorithm (Euclid s algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≤ A yields yes… … Wikipedia
Controlled Cryptographic Item — A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… … Wikipedia
Chroma key — For the progressive rock band, see Chroma Key. For musical tonality depending on key, see Key coloration. Bluescreen and Green screen redirect here. For other uses, see Blue screen and Green screen (disambiguation), respectively. Today s… … Wikipedia
Shor's algorithm — Shor s algorithm, first introduced by mathematician Peter Shor, is a quantum algorithm for integer factorization. On a quantum computer, to factor an integer N, Shor s algorithm takes polynomial time in log{N}, specifically O((log{N})^3),… … Wikipedia
алгоритм (шифрования), управляемый ключом — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN key controlled algorithm … Справочник технического переводчика
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
NSA cryptography — The vast majority of the National Security Agency s work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia