-
1 polynomial security
полиномиальная безопасность, безопасность в полиномиальном времениАнгло-русский словарь по компьютерной безопасности > polynomial security
-
2 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
3 polynomial code
eng.polynomial coderus.полиномиальный кодukr.поліноміальний кодКод с обнаружением ошибок, в котором контрольные разряды являются остатком от деления передаваемых разрядов на фиксируемое число.English-Russian dictionary of information security > polynomial code
-
4 bezpieczeństwo wątków
• polynomial security• thread safetySłownik polsko-angielski z Elektroniki i Informatyki > bezpieczeństwo wątków
-
5 code
-
6 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
7 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
8 time
время; период времени; момент времени- lag time -
9 operation
Англо-русский словарь по компьютерной безопасности > operation
-
10 matrix
-
11 полиномиальный код
eng.polynomial coderus.полиномиальный кодukr.поліноміальний кодКод с обнаружением ошибок, в котором контрольные разряды являются остатком от деления передаваемых разрядов на фиксируемое число.English-Russian dictionary of information security > полиномиальный код
См. также в других словарях:
Polynomial arithmetic — includes basic mathematical operations such as addition, subtraction, and multiplication. These operations are defined naturally as if the variable x was an element of S. Division is defined similarly, but requires that S be a field. Examples of… … Wikipedia
Security parameter — In cryptography, the security parameter is a variable that measures the input size of the problem. Both the resource requirements of the cryptographic algorithm or protocol as well as the adversary s probability of breaking security are expressed … Wikipedia
Semantic security — is a widely used definition for security in an asymmetric key encryption algorithm. For a cryptosystem to be semantically secure, it must be infeasible for a computationally bounded adversary to derive significant information about a message… … Wikipedia
Concrete security — In cryptography, concrete security or exact security is a practice oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. Traditionally, provable… … Wikipedia
Ciphertext Indistinguishability — (Ununterscheidbarkeit von Geheimtexten) ist ein Begriff der bei Sicherheitsbeweisen von Verschlüsselungsverfahren verwendet wird. Bei einem Verfahren mit dieser Eigenschaft kann ein Angreifer nicht zwischen den Geheimtexten zweier Klartexte… … Deutsch Wikipedia
NTRUEncrypt — The NTRUEncrypt public key cryptosystem, also known as the NTRU encryption algorithm, is a lattice based alternative to RSA and ECC and is based on the shortest vector problem in a lattice (i.e. is not breakable using quantum computers).… … Wikipedia
Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… … Wikipedia
Fixed income attribution — refers to the process of measuring returns generated by various sources of risk in a fixed income portfolio, particularly when multiple sources of return are active at the same time. For example, the risks affecting the return of a bond portfolio … Wikipedia
Fixed-income attribution — refers to the process of measuring returns generated by various sources of risk in a fixed income portfolio, particularly when multiple sources of return are active at the same time. For example, the risks affecting the return of a bond portfolio … Wikipedia
Ciphertext indistinguishability — is a property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of indistinguishability, then an adversary will be unable to distinguish pairs of ciphertexts based on the message they encrypt. The property of… … Wikipedia
Negligible function — For other uses, see negligible. In mathematics, a negligible function is a function such that for every positive integer c there exists an integer Nc such that for all x > Nc, Equivalently, we may also use the following definition. A … Wikipedia