-
1 cipher length
Безопасность: длина шифртекста -
2 cipher length
Англо-русский словарь по компьютерной безопасности > cipher length
-
3 length
1) длина2) продолжительность, длительность -
4 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
5 string
-
6 sequence
2) последовательность (знаков, символов), порядок следования- sequence- finite sequence- finite-length sequence- maximum-length sequence- maximum sequenceАнгло-русский словарь по компьютерной безопасности > sequence
-
7 code
1) код, шифр || кодировать3) кодекс; свод4) вчт программа || программировать, писать программу5) нормы и правила; правила эксплуатации•to translate the code — преобразовывать код; транслировать программу
- sum code -
8 code
1) код
2) зашифровывать
3) кодекс
4) кодировать
5) уложение
6) шифровальный
7) марка
8) закодировать
9) кодовый
10) программа
11) свод
– address code
– alphabetic code
– alphanumeric code
– authentication code
– Baudot code
– binary code
– biquinary code
– blob code
– block code
– brevity code
– building code
– character code
– cipher code
– code adjustment
– code bar
– code barbling
– code beacon
– code combination
– code conversion
– code converter
– code data
– code element
– code in card
– code language
– code letter
– code message
– code pattern
– code pulse
– code reading
– code statement
– code switching
– code track
– code translation
– code tree
– color code
– complete code
– computer code
– control code
– convolutional code
– cyclic code
– decimal code
– EBCDI code
– efficiency of code
– equal-length code
– error-correcting code
– error-detection code
– excess-three code
– exit code
– five-unit code
– frequency code
– Gray code
– group code
– Hoffman code
– identification code
– identity code
– instruction code
– instrument a code
– interrogation code
– machine code
– machine-language code
– make-up code
– mnemonic code
– Morse code
– multiaddress code
– multifrequency code
– non-systematic code
– numerical code
– object code
– operation code
– parallel code
– parity-check code
– permutation code
– pick off the code
– product code
– pulse code
– pulse-position code
– pulse-width code
– redundance code
– reflected code
– safety code
– self-checking code
– self-complementing code
– serial code
– service code
– severity code
– short code
– sign code
– signalling code
– straight code
– strip code
– systematic code
– telegraph code
– teleprinter code
– ternary code
– threaded code
– translate a code
– two-case code
– two-out-of-five code
– unit-counting code
– Van Duuren code
– variable-length code
– weighted code
group code recording — запись по способу группового кодирования
national electric code — национальные правила по установке электрооборудования
peer code review — <comput.> отзыв на программу, рецензирование программы
-
9 code
-
10 analysis
- analysis of observations
- analysis of optical spectrum - activation analysis
- a-posteriori analysis
- approximate analysis
- a-priori analysis
- automatic number analysis
- batch circuit analysis
- behavioral analysis
- binding-time analysis
- bottom-up analysis
- cepstral analysis
- cipher analysis
- circuit analysis
- cluster analysis
- combinatorial analysis
- comparative analysis
- compatibility analysis
- complex analysis
- content analysis
- contingency analysis
- conversational analysis
- cost analysis
- cost/benefit analysis
- covariance analysis
- critical path analysis
- crystal analysis
- cyclic analysis
- dataflow analysis
- decision-tree analysis
- dimensional analysis
- discourse analysis
- discriminant analysis
- display data analysis
- domain analysis
- EDX analysis
- electron diffraction analysis
- electron probe analysis
- empirical analysis
- energy-dispersive X-ray analysis
- error analysis
- factor analysis
- failure analysis - fluorescence analysis
- Fourier analysis
- fractal image analysis
- frequency analysis
- frequency-domain analysis
- frequency-response analysis
- functional analysis
- fuzzy analysis
- fuzzy logic analysis
- harmonic analysis
- incremental circuit analysis
- interactive signal analysis
- interferometric analysis
- interval analysis
- joint analysis
- Kaplan-Meier analysis
- kernel discriminant analysis
- k-means cluster analysis
- large-signal analysis
- laser microprobe analysis
- linear two-group discriminant analysis
- linguistic analysis
- logic analysis
- logistic analysis
- logit analysis
- log-linear analysis
- luminescent analysis
- magnetic neutron diffraction analysis
- malfunction analysis
- mathematical analysis
- matrix analysis
- maximum-likelihood analysis
- means/ends analysis
- memory operating characteristic analysis
- mesh analysis
- meta-analysis
- microprobe analysis
- mixed-level analysis
- mixed-mode analysis
- modified nodal analysis
- Monte-Carlo analysis
- morphological analysis
- multifactor analysis of variance
- multilevel analysis
- multimode analysis
- multiple discriminant analysis
- multivariate analysis
- network analysis
- nodal analysis
- numerical analysis - operation analysis
- path analysis
- phase-plane analysis
- photon analysis
- photothermoelectric analysis
- policy analysis - probabilistic analysis
- problem analysis
- protocol analysis
- qualitative analysis
- quantitative analysis
- radar signal analysis
- radiographic analysis
- radiometric analysis
- randomized block analysis of variance
- receiver operating characteristic analysis
- regression analysis
- regression correlation analysis
- repeated measures analysis of variance
- requirements analysis
- risk analysis
- sampling analysis
- set analysis
- signature analysis
- single-mode analysis
- small-signal analysis
- sound analysis
- sparse table analysis
- spectral analysis
- spectrophotometric analysis
- spectrum signature analysis
- speech analysis
- static analysis
- statistical analysis
- sticky analysis
- structural analysis
- structured analysis
- structured systems analysis
- survival analysis
- syntactic analysis
- syntactical analysis
- system analysis
- system analysis in control
- tensor analysis
- time-domain analysis
- time-to-event analysis
- top-down analysis
- topological analysis
- traffic analysis
- trend analysis
- two-factor factorial analysis of variance
- wave-length dispersive X-ray analysis
- weighted analysis
- what if analysis
- worst-case analysis
- X-ray analysis
- X-ray spectral analysis
- X-ray structure analysis -
11 analysis
- a posteriori analysis
- a priori analysis
- activation analysis
- analysis of covariance
- analysis of means
- analysis of observations
- analysis of optical spectrum
- analysis of variance
- approximate analysis
- automatic number analysis
- batch circuit analysis
- behavioral analysis
- binding-time analysis
- bottom-up analysis
- cepstral analysis
- cipher analysis
- circuit analysis
- cluster analysis
- combinatorial analysis
- comparative analysis
- compatibility analysis
- complex analysis
- content analysis
- contingency analysis
- conversational analysis
- cost analysis
- cost/benefit analysis
- covariance analysis
- critical path analysis
- crystal analysis
- cyclic analysis
- dataflow analysis
- decision-tree analysis
- dimensional analysis
- discourse analysis
- discriminant analysis
- display data analysis
- domain analysis
- EDX analysis
- electron diffraction analysis
- electron probe analysis
- empirical analysis
- energy-dispersive X-ray analysis
- error analysis
- factor analysis
- failure analysis
- failure mode and effects analysis
- fault-tree analysis
- feature analysis
- finite element analysis
- flow analysis
- fluorescence analysis
- Fourier analysis
- fractal image analysis
- frequency analysis
- frequency-domain analysis
- frequency-response analysis
- functional analysis
- fuzzy analysis
- fuzzy logic analysis
- harmonic analysis
- incremental circuit analysis
- interactive signal analysis
- interferometric analysis
- interval analysis
- joint analysis
- Kaplan-Meier analysis
- kernel discriminant analysis
- k-means cluster analysis
- large-signal analysis
- laser microprobe analysis
- linear two-group discriminant analysis
- linguistic analysis
- logic analysis
- logistic analysis
- logit analysis
- log-linear analysis
- luminescent analysis
- magnetic neutron diffraction analysis
- malfunction analysis
- mathematical analysis
- matrix analysis
- maximum-likelihood analysis
- means/ends analysis
- memory operating characteristic analysis
- mesh analysis
- meta-analysis
- microprobe analysis
- mixed-level analysis
- mixed-mode analysis
- modified nodal analysis
- Monte-Carlo analysis
- morphological analysis
- multifactor analysis of variance
- multilevel analysis
- multimode analysis
- multiple discriminant analysis
- multivariate analysis
- network analysis
- nodal analysis
- numerical analysis
- object-oriented analysis
- off-line circuit analysis
- operation analysis
- path analysis
- phase-plane analysis
- photon analysis
- photothermoelectric analysis
- policy analysis
- predictable failure analysis
- principal components analysis
- probabilistic analysis
- problem analysis
- protocol analysis
- qualitative analysis
- quantitative analysis
- radar signal analysis
- radiographic analysis
- radiometric analysis
- randomized block analysis of variance
- receiver operating characteristic analysis
- regression analysis
- regression correlation analysis
- repeated measures analysis of variance
- requirements analysis
- risk analysis
- sampling analysis
- set analysis
- signature analysis
- single-mode analysis
- small-signal analysis
- sound analysis
- sparse table analysis
- spectral analysis
- spectrophotometric analysis
- spectrum signature analysis
- speech analysis
- static analysis
- statistical analysis
- sticky analysis
- structural analysis
- structured analysis
- structured systems analysis
- survival analysis
- syntactic analysis
- syntactical analysis
- system analysis in control
- system analysis
- tensor analysis
- time-domain analysis
- time-to-event analysis
- top-down analysis
- topological analysis
- traffic analysis
- trend analysis
- two-factor factorial analysis of variance
- wave-length dispersive X-ray analysis
- weighted analysis
- what if analysis
- worst-case analysis
- X-ray analysis
- X-ray spectral analysis
- X-ray structure analysisThe New English-Russian Dictionary of Radio-electronics > analysis
-
12 table
табель; штаты; таблица; стол; пульт; стенд; сводить в [составлять] таблицуembarkation (and tonnage) table — мор. план погрузки
— aircraft loading table— bombing table— launching table* * *• 1) составлять таблицы; 2) составленный таблицы; 3) представленный на рассмотрение• таблица -
13 block size
размер блока, длина блокаобычно задаётся в байтах; например, размер индивидуального пакета данных, передаваемого по соответствующему сетевому протоколу.Syn:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > block size
См. также в других словарях:
Cipher (album) — Cipher Studio album by The Alpha Conspiracy Released 2001 … Wikipedia
Cipher in the Snow — Directed by Keith J. Atkinson Produced by Judge Whitaker Keith J. Atkinson Written by Jean Mizer Screenplay by Carol Lynn Pearson … Wikipedia
Cipher Method — Studio album by Negative Format Released 2003 Genre … Wikipedia
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Cipher System / By Night — Infobox Album Name = Cipher System / By Night Type = ep Artist = Cipher System and By Night Released = June 18, 2004 Genre = Death metal, extreme metal Length = 21:35 Label = Lifeforce Chronology = By Night This album = Cipher System / By Night… … Wikipedia
cipher — Any cryptographic system in which arbitrary symbols (or groups of symbols) represent units of plain text of regular length, usually single letters; units of plain text are rearranged; or both, in accordance with certain predetermined rules. See… … Military dictionary
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… … Wikipedia