-
1 cipher frequency table
Военный термин: частотная шифровальная таблицаУниверсальный англо-русский словарь > cipher frequency table
-
2 cipher frequency table
English-Russian military dictionary > cipher frequency table
-
3 table
табель; штаты; таблица; стол; пульт; стенд; сводить в [составлять] таблицуembarkation (and tonnage) table — мор. план погрузки
— aircraft loading table— bombing table— launching table* * *• 1) составлять таблицы; 2) составленный таблицы; 3) представленный на рассмотрение• таблица -
4 table
-
5 частотная шифровальная таблица
Military: cipher frequency tableУниверсальный русско-английский словарь > частотная шифровальная таблица
-
6 analysis
- analysis of observations
- analysis of optical spectrum - activation analysis
- a-posteriori analysis
- approximate analysis
- a-priori analysis
- automatic number analysis
- batch circuit analysis
- behavioral analysis
- binding-time analysis
- bottom-up analysis
- cepstral analysis
- cipher analysis
- circuit analysis
- cluster analysis
- combinatorial analysis
- comparative analysis
- compatibility analysis
- complex analysis
- content analysis
- contingency analysis
- conversational analysis
- cost analysis
- cost/benefit analysis
- covariance analysis
- critical path analysis
- crystal analysis
- cyclic analysis
- dataflow analysis
- decision-tree analysis
- dimensional analysis
- discourse analysis
- discriminant analysis
- display data analysis
- domain analysis
- EDX analysis
- electron diffraction analysis
- electron probe analysis
- empirical analysis
- energy-dispersive X-ray analysis
- error analysis
- factor analysis
- failure analysis - fluorescence analysis
- Fourier analysis
- fractal image analysis
- frequency analysis
- frequency-domain analysis
- frequency-response analysis
- functional analysis
- fuzzy analysis
- fuzzy logic analysis
- harmonic analysis
- incremental circuit analysis
- interactive signal analysis
- interferometric analysis
- interval analysis
- joint analysis
- Kaplan-Meier analysis
- kernel discriminant analysis
- k-means cluster analysis
- large-signal analysis
- laser microprobe analysis
- linear two-group discriminant analysis
- linguistic analysis
- logic analysis
- logistic analysis
- logit analysis
- log-linear analysis
- luminescent analysis
- magnetic neutron diffraction analysis
- malfunction analysis
- mathematical analysis
- matrix analysis
- maximum-likelihood analysis
- means/ends analysis
- memory operating characteristic analysis
- mesh analysis
- meta-analysis
- microprobe analysis
- mixed-level analysis
- mixed-mode analysis
- modified nodal analysis
- Monte-Carlo analysis
- morphological analysis
- multifactor analysis of variance
- multilevel analysis
- multimode analysis
- multiple discriminant analysis
- multivariate analysis
- network analysis
- nodal analysis
- numerical analysis - operation analysis
- path analysis
- phase-plane analysis
- photon analysis
- photothermoelectric analysis
- policy analysis - probabilistic analysis
- problem analysis
- protocol analysis
- qualitative analysis
- quantitative analysis
- radar signal analysis
- radiographic analysis
- radiometric analysis
- randomized block analysis of variance
- receiver operating characteristic analysis
- regression analysis
- regression correlation analysis
- repeated measures analysis of variance
- requirements analysis
- risk analysis
- sampling analysis
- set analysis
- signature analysis
- single-mode analysis
- small-signal analysis
- sound analysis
- sparse table analysis
- spectral analysis
- spectrophotometric analysis
- spectrum signature analysis
- speech analysis
- static analysis
- statistical analysis
- sticky analysis
- structural analysis
- structured analysis
- structured systems analysis
- survival analysis
- syntactic analysis
- syntactical analysis
- system analysis
- system analysis in control
- tensor analysis
- time-domain analysis
- time-to-event analysis
- top-down analysis
- topological analysis
- traffic analysis
- trend analysis
- two-factor factorial analysis of variance
- wave-length dispersive X-ray analysis
- weighted analysis
- what if analysis
- worst-case analysis
- X-ray analysis
- X-ray spectral analysis
- X-ray structure analysis -
7 analysis
- a posteriori analysis
- a priori analysis
- activation analysis
- analysis of covariance
- analysis of means
- analysis of observations
- analysis of optical spectrum
- analysis of variance
- approximate analysis
- automatic number analysis
- batch circuit analysis
- behavioral analysis
- binding-time analysis
- bottom-up analysis
- cepstral analysis
- cipher analysis
- circuit analysis
- cluster analysis
- combinatorial analysis
- comparative analysis
- compatibility analysis
- complex analysis
- content analysis
- contingency analysis
- conversational analysis
- cost analysis
- cost/benefit analysis
- covariance analysis
- critical path analysis
- crystal analysis
- cyclic analysis
- dataflow analysis
- decision-tree analysis
- dimensional analysis
- discourse analysis
- discriminant analysis
- display data analysis
- domain analysis
- EDX analysis
- electron diffraction analysis
- electron probe analysis
- empirical analysis
- energy-dispersive X-ray analysis
- error analysis
- factor analysis
- failure analysis
- failure mode and effects analysis
- fault-tree analysis
- feature analysis
- finite element analysis
- flow analysis
- fluorescence analysis
- Fourier analysis
- fractal image analysis
- frequency analysis
- frequency-domain analysis
- frequency-response analysis
- functional analysis
- fuzzy analysis
- fuzzy logic analysis
- harmonic analysis
- incremental circuit analysis
- interactive signal analysis
- interferometric analysis
- interval analysis
- joint analysis
- Kaplan-Meier analysis
- kernel discriminant analysis
- k-means cluster analysis
- large-signal analysis
- laser microprobe analysis
- linear two-group discriminant analysis
- linguistic analysis
- logic analysis
- logistic analysis
- logit analysis
- log-linear analysis
- luminescent analysis
- magnetic neutron diffraction analysis
- malfunction analysis
- mathematical analysis
- matrix analysis
- maximum-likelihood analysis
- means/ends analysis
- memory operating characteristic analysis
- mesh analysis
- meta-analysis
- microprobe analysis
- mixed-level analysis
- mixed-mode analysis
- modified nodal analysis
- Monte-Carlo analysis
- morphological analysis
- multifactor analysis of variance
- multilevel analysis
- multimode analysis
- multiple discriminant analysis
- multivariate analysis
- network analysis
- nodal analysis
- numerical analysis
- object-oriented analysis
- off-line circuit analysis
- operation analysis
- path analysis
- phase-plane analysis
- photon analysis
- photothermoelectric analysis
- policy analysis
- predictable failure analysis
- principal components analysis
- probabilistic analysis
- problem analysis
- protocol analysis
- qualitative analysis
- quantitative analysis
- radar signal analysis
- radiographic analysis
- radiometric analysis
- randomized block analysis of variance
- receiver operating characteristic analysis
- regression analysis
- regression correlation analysis
- repeated measures analysis of variance
- requirements analysis
- risk analysis
- sampling analysis
- set analysis
- signature analysis
- single-mode analysis
- small-signal analysis
- sound analysis
- sparse table analysis
- spectral analysis
- spectrophotometric analysis
- spectrum signature analysis
- speech analysis
- static analysis
- statistical analysis
- sticky analysis
- structural analysis
- structured analysis
- structured systems analysis
- survival analysis
- syntactic analysis
- syntactical analysis
- system analysis in control
- system analysis
- tensor analysis
- time-domain analysis
- time-to-event analysis
- top-down analysis
- topological analysis
- traffic analysis
- trend analysis
- two-factor factorial analysis of variance
- wave-length dispersive X-ray analysis
- weighted analysis
- what if analysis
- worst-case analysis
- X-ray analysis
- X-ray spectral analysis
- X-ray structure analysisThe New English-Russian Dictionary of Radio-electronics > analysis
-
8 list
См. также в других словарях:
Cipher disk — The Union Cipher Disk from the American Civil War was 3.75 inches (95 mm) in diameter and made of light yellow heavy card stock. It consisted of two concentric disks of unequal size revolving on a central pivot. The disks were divided along their … Wikipedia
Playfair cipher — The Playfair cipher or Playfair square is a manual symmetric encryption technique and was the first literal digraph substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair who promoted the… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
Caesar cipher — The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p … Wikipedia
Two-square cipher — The Two square cipher is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four square cipher while still being slightly stronger than the Playfair cipher … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
Letter frequency — The frequency of letters in text has often been studied for use in cryptography, and frequency analysis in particular. No exact letter frequency distribution underlies a given language, since all writers write slightly differently. Linotype… … Wikipedia
Four-square cipher — The Four square cipher is a manual symmetric encryption technique. It was invented by famous French cryptographer Felix Delastelle.The technique encrypts pairs of letters ( digraphs ), and thus falls into a category of ciphers known as… … Wikipedia
Keyword cipher — A keyword is a monoalphabetic substitution. A keyword is thought of and then the letters of the alphabet are assigned a letter after the keyword has been decided. When the number of letters in the keyword has been assigned their encoded version,… … Wikipedia
Nihilist cipher — In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher originally used by Russian Nihilists in the 1880s to organize terrorism against the czarist regime. The term is sometimes extended to several… … Wikipedia