-
21 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
22 function
1) функция2) функционировать; находиться в работоспособном состоянии3) выполнять функцию; играть роль4) (дополнительное) функциональное устройство, проф. функция ( в стандарте USB)5) вчт. отображение || отображать•- actuating transfer function
- additive function
- additive/multiplicative function
- admittance function
- advanced communication function
- affine Boolean function
- aggregate function
- algebraic function
- all-pass transfer function
- all-pole function
- all-zero function
- alternating function
- ambiguity function
- amplitude distribution function
- amplitude function
- AM-tive function additive/multiplicative function
- anode work function
- aperture phase function
- apodizing function
- application program function
- autocorrelation function
- automatic azimuth alignment function
- band-limited function
- base station control function
- basis function
- Bellman function
- bent function
- Bessel function of imaginary argument
- Bessel function
- beta function
- bijection function
- bijective function
- binary activation function
- binary sigmoid function
- binate function
- bipolar sigmoid function
- bi-state function
- bivariate distribution function
- Boolean function
- Bose-Einstein distribution function
- bounded function
- boxcar function
- Brillouin function
- built-in function
- Butterworth function
- carpet function
- carrier function
- cathode work function
- characteristic function
- circular function
- closed function
- closed-loop transfer function
- clutching function
- coherence function
- color matching functions
- comb function
- combination function
- combining function
- competitive function
- complementary error function
- complementary function
- composite function
- computable function
- concentrated likelihood function
- continuous function
- contrast transfer function
- control function
- convolution function
- correlation function
- cost function
- covariance generating function
- criterion function
- cross-correlation function - current potential function
- current transfer function
- curried function
- data communications function
- data-path function
- decision function
- degate function
- degating function
- delta function
- demand function
- density function
- descrambling function
- describing function
- difference transfer function
- differentiable function
- digamma function
- Dirac delta function
- Dirac function
- disconnect-reconnect function
- discriminant function
- distribution function
- driving-point function
- eikonal function
- electron wave function
- embedding function
- encryption function
- ergodic function
- error function
- excitation function
- explicit function
- exponential function
- extensional function
- external function
- failure density function
- feedback transfer function
- Fermi function
- Fermi-Dirac distribution function
- force function
- forward transfer function
- frequency function
- frequency-generating function
- frequency-response function
- friend function
- FS function
- full-speed function
- fuzzy function
- fuzzy objective function
- fuzzy utility function
- gage function
- Gaussian function
- Gaussian radial basis function
- generalized function
- generic function
- global implicit function
- global inverse function
- Green functions
- Green's function
- Hamilton function
- Hankel function
- hard limit activation function - hazard function
- head-related transfer function
- Heaviside step function
- Huber function
- hyperbolic function
- hyperbolic tangent activation function
- idempotent function
- image function
- impedance function
- implicit function
- injection function
- injective function
- inline function
- intensional function
- interference function
- interworking function
- inverse distribution function
- inverse function
- invertible mapping function
- inverting function
- kernel function
- Lagrange's function
- Langevin function
- latent function
- Legendre associated function of the first kind
- Legendre associated function of the second kind
- Legendre function of the first kind
- Legendre function of the second kind
- lexical function
- likelihood function
- line search function
- linear function
- linear logic function
- logic function
- logistic function
- logistic sigmoid function
- log-likelihood function
- log-linear function
- log-log function
- look-up function
- loss function
- low-speed function
- LS function
- luminosity function
- macro function
- main function
- maintenance entity function
- majorized function
- majorizing function
- mapping function
- Markov function
- mathematical function
- member function
- membership function
- memo function
- memoised function
- memoized function
- minorized function
- minorizing function
- modified Bessel function
- modular hash-function
- modulating function
- modulation transfer function
- moment-generating function
- monotonic function
- Morse function
- multi-input multi-output transfer function
- multi-valued function
- multivariate distribution function
- mutual coherence function
- natural trigonometric function
- never-decreasing function
- never-increasing function
- non-decreasing function
- non-increasing function
- nonlinear function
- normalized Gaussian radial basis function
- normalized radial basis functions with equal heights
- normalized radial basis functions with equal volumes
- normalized radial basis functions with equal widths and heights
- normalized radial basis functions with equal widths
- normalized radial basis functions with unequal widths and heights
- objective function
- one-one function
- one-to-one function
- one-way function
- one-way hash function
- open-loop transfer function
- optical transfer function
- ordinary Gaussian radial basis function
- ordinary radial basis functions with equal widths
- ordinary radial basis functions with unequal widths
- orthogonal functions
- overlapped functions
- partial autocorrelation function
- penalty function
- perfect hash-function
- phase transfer function
- photoelectric work function
- photopic response function
- piecewise constant function
- piecewise linear function
- piecewise polynomial function
- Pierce function
- point-spread function
- polynomial function
- positive linear function
- postsynaptic potential function
- power function of test
- power function
- predefined function
- predicate function
- probability density function
- probability function
- probability mass function
- production function
- projection function
- projective function
- propagation function
- propositional function
- PSP function
- pulsating function
- pure virtual function
- quadratic error function
- radial basis function
- radial combination function
- ramp function
- range weighting function
- reactance function
- register function
- regression function
- resolvent function
- response function
- restricted function
- risk function
- saturating linear function
- scalar function
- scaling function
- scattering function
- scedastic function
- Schrödinger wave function
- scrambling function
- screen size-viewing distance function
- self-inverse function
- semilinear function
- sensing function
- sentential function
- shape function
- sigmoid activation function
- sigmoid function
- sign function
- signal function
- signum activation function
- signum function
- smooth function
- socket library function
- softmax activation function
- spectral density function
- spectral function
- spectral radiance function
- spline function
- spot function
- spread function
- square-integrable function
- square-law transfer function
- squashed sign function
- squashing function
- state function
- state query function
- steering function
- step function
- stream function
- summing function
- support entity function
- support function
- supported function
- surjection function
- surjective function
- survival function
- switch function
- switching function
- switch-type function
- symmetric saturating linear function
- tame function
- tan-sigmoid activation function
- target function
- tensor function
- tesseral function
- testing function
- tetragamma function
- thermionic work function
- threshold function
- through transfer function
- transcendental function
- transfer function
- trial function
- trigamma function
- trigonometric function
- tri-state function
- typematic function
- unate function
- uncurried function
- unit impulse function
- unit step function
- unsupported function
- user-defined function
- utility function
- vector function
- virtual function
- visibility function
- voltage potential function
- voltage transfer function
- Walsh functions
- wave function
- wave-number limited function
- weighting function
- window function
- work functionThe New English-Russian Dictionary of Radio-electronics > function
-
23 asymmetric cipher
криптографический алгоритм, в котором ключ шифрования не совпадает с ключом дешифрования. Ключ для шифрования называется открытым ключом (public key), а другой, для расшифровки, известный только получателю сообщения, - секретным ключом (private key). Асимметричные шифры значительно слабее симметричных и потому не применяются для шифрования длинных сообщенийAnt:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > asymmetric cipher
-
24 digital envelope
метод применения шифрования с открытым ключом для безопасного распространения секретных ключей (private key), использующихся при симметричном шифровании, и для посылки зашифрованных сообщенийАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > digital envelope
- 1
- 2
См. также в других словарях:
symmetric encryption — simetrinis šifravimas statusas T sritis informatika apibrėžtis Šifravimo metodas, naudojantis tą patį ↑raktą (3) duomenims ↑užšifruoti ir ↑iššifruoti. atitikmenys: angl. symmetric encryption ryšiai: dar žiūrėk – iššifruoti dar žiūrėk –… … Enciklopedinis kompiuterijos žodynas
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Integrated Encryption Scheme — (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is allowed to use chosen plaintext and chosen ciphertext attacks. The security of the scheme is based on the Diffie–Hellman problem. Two incarnations of … Wikipedia
data encryption — Process of disguising information as ciphertext, or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography).… … Universalium
Efficient Probabilistic Public-Key Encryption Scheme — EPOC (Efficient Probabilistic Public Key Encryption) is a probabilistic public key encryption scheme.EPOC was developed in 1999 by T. Okamoto, S. Uchiyama and E. Fujisaki of NTT Labs in Japan. It is based on the random oracle model, in which a… … Wikipedia
40-bit encryption — refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security. A forty bit length corresponds to a total of 2^{40} possible keys. Although this is a large number in human terms… … Wikipedia
Advanced Encryption Standard — AES Der Substitutionschritt, einer von 4 Teilschritten pro Runde Entwickler Joan Daemen, Vincent Rijmen Veröffentlicht 1998, Zertifizierung Oktober 2000 Abgeleitet … Deutsch Wikipedia
Hardware-based full disk encryption — is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi, Ltd. with the rest of the hard drive industry following. Encryption and the symmetric encryption key is maintained independently from the CPU, thus… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia