-
1 binary cryptogram
Англо-русский словарь по компьютерной безопасности > binary cryptogram
-
2 cryptogram
криптограмма, шифротекст (ciphertext) зашифрованный текст, шифротекст, криптограммаАнгло-русский словарь по компьютерной безопасности > cryptogram
-
3 sequence
2) последовательность (знаков, символов), порядок следования- sequence- finite sequence- finite-length sequence- maximum-length sequence- maximum sequenceАнгло-русский словарь по компьютерной безопасности > sequence
-
4 string
-
5 alphabet
Англо-русский словарь по компьютерной безопасности > alphabet
-
6 space
1) пространство2) пробел; знак пробела
См. также в других словарях:
Chip Authentication Program — A GemAlto EZIO CAP Device Whitelabeled as Barclays PINSentry The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
noise — Synonyms and related words: ALGOL, Aesopian language, Babel, Bedlam let loose, COBOL, EDP, FORTRAN, Greek, aimlessness, alphabetic data, alphanumeric code, amplitude, angular data, argot, assembler, atmospherics, auditory effect, auditory… … Moby Thesaurus
ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev … Wikipedia
Merkle–Hellman knapsack cryptosystem — The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems invented by Ralph Merkle and Martin Hellman in 1978.[1] Although its ideas are elegant, and far simpler than RSA, it has been broken.[2] Contents 1… … Wikipedia
Marshall McLuhan — McLuhan redirects here. For the son of Marshall McLuhan, see Eric McLuhan. Marshall McLuhan Marshall McLuhan in the early 1970s Born July 21, 1911(1911 07 21) Edmonton, Alberta, Canada … Wikipedia
Hill cipher — Hill s cipher machine, from figure 4 of the patent In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was… … Wikipedia
Pigpen cipher — The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram.[1] The pigpen cipher (sometimes referred to as the masonic cipher, Freemason s cipher, Rosicrucian cipher, or Tic tac toe cipher) … Wikipedia
Baconian theory — The Baconian theory of Shakespearean authorship holds that Sir Francis Bacon wrote the plays conventionally attributed to William Shakespeare.The mainstream view is that William Shakespeare of Stratford, an actor in the Lord Chamberlain s Men… … Wikipedia