-
1 cipher concealment
сокрытие шифра; использование скрытого шифра в обычном тексте -
2 cipher concealment
сокрытие шифра; использование скрытого шифра в обычном текстеThe New English-Russian Dictionary of Radio-electronics > cipher concealment
-
3 concealment
маскирование; сокрытие- error concealment
- error concealment by holding
- error concealment by interpolation
- error concealment by muting -
4 concealment
маскирование; сокрытие- error concealment by holding
- error concealment by interpolation
- error concealment by muting
- error concealmentThe New English-Russian Dictionary of Radio-electronics > concealment
-
5 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system
См. также в других словарях:
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
concealment — I (New American Roget s College Thesaurus) Keeping secret Nouns 1. concealment; hiding[ place]; curtain, screen, blind; smokescreen, ambush, camouflage; hideaway, hideout, sanctum sanctorum, safe house; secret passage or exit, back or side door,… … English dictionary for students
concealment cipher — noun : a method of hiding a message in a cover text (as the trellis cipher) … Useful english dictionary
cipher — I (New American Roget s College Thesaurus) n. naught, zero; nonentity; cryptogram, codes, cryptology; monogram, device. See concealment, insubstantiality, numeration. II (Roget s IV) n. Syn. naught, blank, goose egg*; see zero 1 . v. Syn. compute … English dictionary for students
ICE (cipher) — Infobox block cipher name = ICE caption = The ICE Feistel function designers = Matthew Kwan publish date = 1997 derived from = DES derived to = key size = 64 bits (ICE), 64 times; n bits (ICE n ) block size = 64 bits structure = Feistel network… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Baconian theory — The Baconian theory of Shakespearean authorship holds that Sir Francis Bacon wrote the plays conventionally attributed to William Shakespeare.The mainstream view is that William Shakespeare of Stratford, an actor in the Lord Chamberlain s Men… … Wikipedia
Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… … Wikipedia
code — I (New American Roget s College Thesaurus) n. cipher, secret writing, cryptogram; law, canon, principle, codex, constitution, system, standard, rule. See concealment, legality, interpretation. II (Roget s IV) n. 1. [A set of rules] Syn. body of… … English dictionary for students