-
1 secure hash algorithm
secure hash algorithm (SHA) COMP, LAW sicherer Hash-Algorithmus m, SHA m (standardisierte kryptografische Funktion zur Berechnung eines eindeutigen Prüfwerts für elektronische Daten)Englisch-Deutsch Fachwörterbuch der Wirtschaft > secure hash algorithm
-
2 secure hash algorithm
English-German dictionary of Electrical Engineering and Electronics > secure hash algorithm
-
3 secure hash algorithm
алгоритм аутентификации и проверки целостности информации
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
алгоритм защитного хэширования
(МСЭ-Т Н.235.1, МСЭ-Т Н.235.2, МСЭ-Т Н.235.3, МСЭ-T H.235.6).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
Англо-русский словарь нормативно-технической терминологии > secure hash algorithm
-
4 Secure Hash Algorithm 1
"An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places." -
5 Secure Hash Algorithm
Майкрософт: алгоритм SHA -
6 secure hash algorithm
Майкрософт: алгоритм SHA -
7 Secure Hash Algorithm
1) Abbreviation: SHA (see also MD5)Универсальный русско-английский словарь > Secure Hash Algorithm
-
8 Secure Hash Algorithm 1
Information technology: SHA1 (Verschluesselung, SHA)Универсальный русско-английский словарь > Secure Hash Algorithm 1
-
9 secure hash algorithm
= SHAEnglish-Russian electronics dictionary > secure hash algorithm
-
10 secure hash algorithm
стандарт SHA, стандартный алгоритм шифрования сообщений методом хэширования; криптографическая хэш-функция SHAThe New English-Russian Dictionary of Radio-electronics > secure hash algorithm
-
11 Secure Hash Algorithm
Стойкий алгоритм хэшированияEnglish-Russian cryptological dictionary > Secure Hash Algorithm
-
12 secure hash algorithm
English-Russian information technology > secure hash algorithm
-
13 algorithm
1) алгоритм2) правило; процедура; метод•- adaptive algorithm
- Agarval-Cooley algorithm
- aim algorithm
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- backoff algorithm
- back propagation of error algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm - CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm - greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm - iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-Moore algorithm
- Lee algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm - min-cut algorithm - nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- quantum search algorithm
- quick-union algorithm
- quick-union algorithm with path compression
- Q-R-algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm - routing algorithm
- Rprop algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm - self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm - shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithm -
14 algorithm
1) алгоритм2) правило; процедура; метод•- Agarval-Cooley algorithm
- aim algorithm
- algorithm of doubtful convergence
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- back propagation of error algorithm
- backoff algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm
- British Telecom Lempel-Ziv algorithm
- BTLZ algorithm
- CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm
- genetic algorithm
- graph search algorithm
- greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm
- international data encryption algorithm
- iterative algorithm
- iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-algorithm
- Lee-Moore algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm
- message authentication algorithm
- metaheuristic algorithm
- min-cut algorithm
- modified Gram-Schmidt algorithm
- Nelder-Mead simplex algorithm
- nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- Q-R-algorithm
- quantum search algorithm
- quick-union algorithm with path compression
- quick-union algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm
- Rivest-Shamir-Adleman algorithm
- robust algorithm
- routing algorithm
- RProp algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm
- secure hash algorithm
- selective-trace algorithm
- self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm
- sequential leader clustering algorithm
- serial algorithm
- shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithmThe New English-Russian Dictionary of Radio-electronics > algorithm
-
15 sicherer Hash-Algorithmus
Deutsch-Englisch Wörterbuch der Elektrotechnik und Elektronik > sicherer Hash-Algorithmus
-
16 sicherer Hash-Algorithmus
sicherer Hash-Algorithmus m (SHA) COMP, RECHT secure hash algorithm (standardisierte kryptografische Funktion zur Berechnung eines eindeutigen Prüfwerts für elektronische Daten)Business german-english dictionary > sicherer Hash-Algorithmus
-
17 SHA
= secure hash algorithmстандарт SHA, стандартный алгоритм шифрования сообщений методом хэширования; криптографическая хэш-функция SHA -
18 SHA
1) Спорт: Saskatchewan Hockey Association2) Военный термин: Secure Hast Algorithm4) Сельское хозяйство: Sheep Herders Of America5) Религия: Saint Holos of Armenia6) Юридический термин: Shareholders Agreement7) Сокращение: System Hazard Analysis, Secure Hash Algorithm (see also MD5)8) Университет: Student Health Advocates, Student Housing Area9) Физиология: Shampoo10) Вычислительная техника: Secure Hash Algorithm, Software House Association, защищённый алгоритм хеширования, Super High Aperture (LCD, LCD), Secure Hash Algorithm (Verschluesselung, NIST)11) Банковское дело: оплачиваются раздельно (В свифтах: Строка "Детали сборов", банковские комиссии оплачиваются раздельно плательщиком и получателем)12) Транспорт: State Highway Agency13) Глоссарий компании Сахалин Энерджи: Shareholder Agreement14) Расширение файла: Secure Hash Algorithm (NSA)15) Майкрософт: агент работоспособности системы16) Аэропорты: Shanghai, Mainland China17) Единицы измерений: Sidereal Hour Angle -
19 sha
1) Спорт: Saskatchewan Hockey Association2) Военный термин: Secure Hast Algorithm4) Сельское хозяйство: Sheep Herders Of America5) Религия: Saint Holos of Armenia6) Юридический термин: Shareholders Agreement7) Сокращение: System Hazard Analysis, Secure Hash Algorithm (see also MD5)8) Университет: Student Health Advocates, Student Housing Area9) Физиология: Shampoo10) Вычислительная техника: Secure Hash Algorithm, Software House Association, защищённый алгоритм хеширования, Super High Aperture (LCD, LCD), Secure Hash Algorithm (Verschluesselung, NIST)11) Банковское дело: оплачиваются раздельно (В свифтах: Строка "Детали сборов", банковские комиссии оплачиваются раздельно плательщиком и получателем)12) Транспорт: State Highway Agency13) Глоссарий компании Сахалин Энерджи: Shareholder Agreement14) Расширение файла: Secure Hash Algorithm (NSA)15) Майкрософт: агент работоспособности системы16) Аэропорты: Shanghai, Mainland China17) Единицы измерений: Sidereal Hour Angle -
20 алгоритм аутентификации и проверки целостности информации
алгоритм аутентификации и проверки целостности информации
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > алгоритм аутентификации и проверки целостности информации
- 1
- 2
См. также в других словарях:
Secure Hash Algorithm 1 — Der Begriff secure hash algorithm (engl. für sicherer Hash Algorithmus), kurz SHA, bezeichnet eine Gruppe standardisierter kryptologischer Hash Funktionen. Diese dienen zur Berechnung eines eindeutigen Prüfwerts für beliebige elektronische Daten … Deutsch Wikipedia
Secure Hash Algorithm — Der Begriff secure hash algorithm (engl. für sicherer Hash Algorithmus), kurz SHA, bezeichnet eine Gruppe standardisierter kryptologischer Hashfunktionen. Diese dienen zur Berechnung eines eindeutigen Prüfwerts für beliebige elektronische Daten.… … Deutsch Wikipedia
Secure Hash Algorithm 2 — SHA 2 (англ. Secure Hash Algorithm Version 2 безопасный алгоритм хеширования, версия 2) собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… … Википедия
Secure Hash Algorithm — La familia SHA (Secure Hash Algorithm, Algoritmo de Hash Seguro) es un sistema de funciones hash criptográficas relacionadas de la Agencia de Seguridad Nacional de los Estados Unidos y publicadas por el National Institute of Standards and… … Wikipedia Español
Secure Hash Algorithm 1 — Криптографическая хеш функция Название SHA 1 Разработчик NSA совместно с NIST Создан 1995 Опубликован 1995 Размер хеша 160 бит Число раундов 80 … Википедия
Secure Hash Algorithm — SHA (Secure Hash Algorithm) est un ensemble de fonctions de hachage cryptographiques conçues par la NSA et publiées par le NIST en tant que Federal Information Processing Standard. Les algorithmes SHA sont SHA 0, SHA 1 et SHA 2. La famille SHA 2… … Wikipédia en Français
SECURE HASH ALGORITHM — (SHA) алгоритм SHAалгоритм аутентификации и проверки целостности информации … Словарь электронного бизнеса
Secure Hash Standard — The Secure Hash Standard (SHS) is a set of cryptographically secure hash algorithms specified by the National Institute of Standards and Technology.The SHS standard specifies a number of Secure Hash Algorithms (SHA), for example SHA 1, SHA 256… … Wikipedia
Hash — Fonction de hachage On nomme fonction de hachage une fonction particulière qui, à partir d une donnée fournie en entrée, calcule une empreinte servant à identifier rapidement, bien qu incomplètement, la donnée initiale. Les fonctions de hachage… … Wikipédia en Français
Hash code — Fonction de hachage On nomme fonction de hachage une fonction particulière qui, à partir d une donnée fournie en entrée, calcule une empreinte servant à identifier rapidement, bien qu incomplètement, la donnée initiale. Les fonctions de hachage… … Wikipédia en Français
Hash-Algorithmus — Eine Hashfunktion oder Streuwertfunktion ist eine Funktion bzw. Abbildung, die zu einer Eingabe aus einer üblicherweise großen Quellmenge eine Ausgabe, den Hashcode, erzeugt, meist aus einer kleineren Zielmenge. Die Hashwerte beziehungsweise… … Deutsch Wikipedia