Перевод: с английского на все языки

со всех языков на английский

privacy cryptosystem

  • 1 privacy cryptosystem

    Универсальный англо-русский словарь > privacy cryptosystem

  • 2 privacy cryptosystem

    Англо-русский словарь по компьютерной безопасности > privacy cryptosystem

  • 3 cryptosystem

    криптографическая система, криптосистема; шифросистема
    - abuse-free cryptosystem
    - algebraic code cryptosystem
    - analog cryptosystem
    - asymmetric cryptosystem
    - asymmetric key cryptosystem
    - authentication/secrecy cryptosystem
    - bijective public key cryptosystem
    - binary cryptosystem
    - block cryptosystem
    - broadcast cryptosystem
    - broadcasting cryptosystem
    - cipher-feedback cryptosystem
    - classical cryptosystem
    - common-key cryptosystem
    - communication cryptosystem
    - compromised cryptosystem
    - computationally secure cryptosystem
    - conference cryptosystem
    - conventional cryptosystem
    - DES-based cryptosystem
    - DES-like cryptosystem
    - deterministic cryptosystem
    - DH cryptosystem
    - Diffie and Hellman cryptosystem
    - discrete-exponentiation cryptosystem
    - discrete log cryptosystem
    - E3 cryptosystem
    - effectively unbreakable cryptosystem
    - elliptic curve cryptosystem
    - endomorphic cryptosystem
    - end-to-end encryption cryptosystem
    - error propagating cryptosystem
    - factorization cryptosystem
    - finite cryptosystem
    - finite automation cryptosystem
    - Galois field cryptosystem
    - general cryptosystem
    - generalized cryptosystem
    - Goppa-code cryptosystem
    - hardware-implemented cryptosystem
    - hidden key cryptosystem
    - high-grade cryptosystem
    - high-speed cryptosystem
    - hybrid public-secret key cryptosystem
    - hybrid stream/block cryptosystem
    - identity-based cryptosystem
    - intractable cryptosystem
    - indecipherable cryptosystem
    - iterated cryptosystem
    - keyed cryptosystem
    - key escrow cryptosystem
    - key-minimal cryptosystem
    - knapsack-based cryptosystem
    - knapsack public key cryptosystem
    - matrix cryptosystem
    - McEliece' cryptosystem
    - Merkle-Hellman cryptosystem
    - MH cryptosystem
    - microprocessor based cryptosystem
    - minuend cryptosystem
    - multiple access cryptosystem
    - multiple destination cryptosystem
    - multiplicative knapsack cryptosystem
    - network cryptosystem
    - non-linear cryptosystem
    - number theoretic cryptosystem
    - one-key cryptosystem
    - one-master-key cryptosystem
    - one-time-key cryptosystem
    - one-time-pad cryptosystem
    - one-time-tape cryptosystem
    - perfect secrecy cryptosystem
    - practical security cryptosystem
    - private key cryptosystem
    - proprietary cryptosystem
    - provable secure cryptosystem
    - public key cryptosystem
    - public key distribution cryptosystem
    - public key signature cryptosystem
    - rapid cryptosystem
    - reciprocal number cryptosystem
    - residue cryptosystem
    - Rivest-Shamir-Adleman cryptosystem
    - rotor cryptosystem
    - RSA public key cryptosystem
    - r-th residue cryptosystem
    - secret-key cryptosystem
    - secure cryptosystem
    - shared key cryptosystem
    - shift register cryptosystem
    - single-key cryptosystem
    - sophisticated cryptosystem
    - split key cryptosystem
    - strong cryptosystem
    - subtractive cryptosystem
    - symmetric cryptosystem
    - theoretically unbreakable cryptosystem
    - threshold cryptosystem
    - transposition cryptosystem
    - trap-door-knapsack public key cryptosystem
    - transient key cryptosystem
    - threshold cryptosystem
    - two-key cryptosystem
    - unbreakable cryptosystem
    - voice cryptosystem
    - cryptosystem immune to cryptoanalysis

    Англо-русский словарь по компьютерной безопасности > cryptosystem

См. также в других словарях:

  • Paillier cryptosystem — The Paillier cryptosystem, named after and invented by Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n th residue classes is believed to be computationally difficult. This… …   Wikipedia

  • GNU Privacy Guard — infobox software developer = GNU Project latest release version = 2.0.9 latest release date = release date and age|2008|03|26 operating system = Cross platform genre = PGP license = GNU General Public License website = [http://gnupg.org/… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Information theoretic security — A cryptosystem is information theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unbounded computing power. An example of an information theoretically secure cryptosystem …   Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • ElGamal encryption — In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public key cryptography which is based on the Diffie Hellman key agreement. It was described by Taher Elgamal in 1984 [Taher ElGamal, A Public Key… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • Private information retrieval — In cryptography, a private information retrieval (PIR) protocol allows a user to retrieve an item from a server in possession of a database without revealing which item she is retrieving. PIR is a weaker version of 1 out of n oblivious transfer,… …   Wikipedia

  • AES-128 — AES Der Substitutionschritt, einer von 4 Teilschritten pro Runde Entwickler Joan Daemen, Vincent Rijmen Veröffentlicht 1998, Zertifizierung Oktober 2000 Abgeleitet von Sq …   Deutsch Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»