-
1 computational cryptography
вычислительная криптография
Криптография на основе вычислительной сложности.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > computational cryptography
-
2 computational cryptography
Безопасность: (complexity based) вычислительная криптография, (complexity based) криптография на основе вычислительной сложностиУниверсальный англо-русский словарь > computational cryptography
-
3 computational cryptography
криптография на основе вычислительной сложности, вычислительная криптографияАнгло-русский словарь по компьютерной безопасности > computational cryptography
-
4 cryptography
1) криптография; криптографическая защита, криптографическое закрытие информации- computational cryptography- computational complexity based cryptographyАнгло-русский словарь по компьютерной безопасности > cryptography
-
5 computational complexity-based cryptography
вычислительная криптография
Криптография на основе вычислительной сложности.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > computational complexity-based cryptography
-
6 computational (complexity based) cryptography
Безопасность: вычислительная криптография, криптография на основе вычислительной сложностиУниверсальный англо-русский словарь > computational (complexity based) cryptography
-
7 computational (complexity based )cryptography
криптография на основе вычислительной сложности, вычислительная криптографияАнгло-русский словарь по компьютерной безопасности > computational (complexity based )cryptography
-
8 computational (complexity based )cryptography
криптография на основе вычислительной сложности, вычислительная криптографияАнгло-русский словарь по компьютерной безопасности > computational (complexity based )cryptography
-
9 computational complexity based cryptography
криптография на основе вычислительной сложности, вычислительная криптографияАнгло-русский словарь по компьютерной безопасности > computational complexity based cryptography
-
10 CCP
1) Общая лексика: Carbon Capture Project, улавливание и утилизация диоксида углеродa2) Компьютерная техника: Connective Component Programming, central collection point3) Биология: critical closing pressure4) Американизм: Correct Control Practices6) Военный термин: Change Control Plan, Communications Checkpoint, Container Consolidation Point, casualty clearing point, casualty collecting point, circulation control point, command control panel, command control post, communications control package, communications control panel, configuration change plan, configuration control panel, console control package, consolidated cryptologic program, consolidation and containerization point, container control point, contamination control point, cross-check procedure7) Техника: cable connector panel, centrifugal charging pump, chance-constrained programming, chemical control procedure, command and control panel, compression control protocol, continuous correlation processing, core component pot8) Шутливое выражение: Can't Code Programs9) Религия: Christian Concert Planning10) Финансы: central counterparty clearing house11) Автомобильный термин: climate control panel, controlled canister purge (GM)12) Биржевой термин: central counterparty group (http://www.lchclearnet.com/)13) Оптика: computer-controlled polisher14) Сокращение: Casualty Collecting Post, Central Command Post, Central Control Point, Chief Commissioner of Police, Chinese Communist Party (China), Chinese Communist Party, Code of Civil Procedure, Code of Criminal Procedure, Coherent Countermeasures Processor, Combat Command Post, Combined Command Post, Computer Control Panel, Consolidated Containerisation Point, Contingency Communications Package, Control & Correlation Processor, Court of Common Pleas, certificate in computer programming, chemical churning pile, console command processor, credit card purchase15) Университет: Co Curricular Programs16) Электроника: Constant Current Power, Critical Control Points17) Вычислительная техника: channel control processor, Command Console Processor (CP/M), Communications Control Program (OS, IBM), (PPP) Compression Control Protocol (PPP, RFC 1962), Compact Communication Products (TPS)18) Нефть: Composite Correction Plan19) Биотехнология: Clathrin-coated pit20) Геофизика: общая точка обмена21) Фирменный знак: Cash And Collateral Pool22) Экология: Canadian Climate Program, Committee on Commodity Problems23) Энергетика: электростанция с парогазовым циклом ((разг.)), парогазовая установка (ПГУ) (combined cycle plant)24) Деловая лексика: Critical Control Point25) Глоссарий компании Сахалин Энерджи: change control procedure26) Менеджмент: current contract price27) Образование: CBT Course Project, Computer Career Program28) Сетевые технологии: Collaborative Computational Project, certified computing professional, communication control package, communication control program, пакет для управления передачей сообщений, программа настройки конфигурации, программа управления передачей сообщений, (Common communications protocol) единый протокол обмена данными29) Контроль качества: contract change proposal30) Электротехника: Converter Commutation Protector (Siemens)31) Должность: Certified Childcare Professional, Certified Compensation Professional, Certified Culinary Professional, Clinical Career Pathway32) Аэропорты: Concepcion, Chile33) НАСА: Cryptography Centralized Policy34) Единицы измерений: Common Conversion Point -
11 ccp
1) Общая лексика: Carbon Capture Project, улавливание и утилизация диоксида углеродa2) Компьютерная техника: Connective Component Programming, central collection point3) Биология: critical closing pressure4) Американизм: Correct Control Practices6) Военный термин: Change Control Plan, Communications Checkpoint, Container Consolidation Point, casualty clearing point, casualty collecting point, circulation control point, command control panel, command control post, communications control package, communications control panel, configuration change plan, configuration control panel, console control package, consolidated cryptologic program, consolidation and containerization point, container control point, contamination control point, cross-check procedure7) Техника: cable connector panel, centrifugal charging pump, chance-constrained programming, chemical control procedure, command and control panel, compression control protocol, continuous correlation processing, core component pot8) Шутливое выражение: Can't Code Programs9) Религия: Christian Concert Planning10) Финансы: central counterparty clearing house11) Автомобильный термин: climate control panel, controlled canister purge (GM)12) Биржевой термин: central counterparty group (http://www.lchclearnet.com/)13) Оптика: computer-controlled polisher14) Сокращение: Casualty Collecting Post, Central Command Post, Central Control Point, Chief Commissioner of Police, Chinese Communist Party (China), Chinese Communist Party, Code of Civil Procedure, Code of Criminal Procedure, Coherent Countermeasures Processor, Combat Command Post, Combined Command Post, Computer Control Panel, Consolidated Containerisation Point, Contingency Communications Package, Control & Correlation Processor, Court of Common Pleas, certificate in computer programming, chemical churning pile, console command processor, credit card purchase15) Университет: Co Curricular Programs16) Электроника: Constant Current Power, Critical Control Points17) Вычислительная техника: channel control processor, Command Console Processor (CP/M), Communications Control Program (OS, IBM), (PPP) Compression Control Protocol (PPP, RFC 1962), Compact Communication Products (TPS)18) Нефть: Composite Correction Plan19) Биотехнология: Clathrin-coated pit20) Геофизика: общая точка обмена21) Фирменный знак: Cash And Collateral Pool22) Экология: Canadian Climate Program, Committee on Commodity Problems23) Энергетика: электростанция с парогазовым циклом ((разг.)), парогазовая установка (ПГУ) (combined cycle plant)24) Деловая лексика: Critical Control Point25) Глоссарий компании Сахалин Энерджи: change control procedure26) Менеджмент: current contract price27) Образование: CBT Course Project, Computer Career Program28) Сетевые технологии: Collaborative Computational Project, certified computing professional, communication control package, communication control program, пакет для управления передачей сообщений, программа настройки конфигурации, программа управления передачей сообщений, (Common communications protocol) единый протокол обмена данными29) Контроль качества: contract change proposal30) Электротехника: Converter Commutation Protector (Siemens)31) Должность: Certified Childcare Professional, Certified Compensation Professional, Certified Culinary Professional, Clinical Career Pathway32) Аэропорты: Concepcion, Chile33) НАСА: Cryptography Centralized Policy34) Единицы измерений: Common Conversion Point
См. также в других словарях:
Computational mathematics — involves mathematical research in areas of science where computing plays a central and essential role, emphasizing algorithms, numerical methods, and symbolic methods. Computation in the research is prominent.[1] Computational mathematics emerged … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Computational hardness assumption — In cryptography, a major goal is to create cryptographic primitives with provable security. In some cases cryptographic protocols are found to have information theoretic security, the one time pad is a common example. In many cases, information… … Wikipedia
Computational indistinguishability — In computational complexity, if and are two distribution ensembles indexed by a security parameter n (which usually refers to the length of the input), then we say they are computationally indistinguishable if for any non uniform probabilistic… … Wikipedia
Computational problem — In theoretical computer science, a computational problem is a mathematical object representing a collection of questions that computers might want to solve. For example, the problem of factoring Given a positive integer n, find a nontrivial prime … Wikipedia
Computational trust — In Information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication… … Wikipedia
Computational theorist — A Computational theorist is a theorist in the areas of Computational Complexity, Computational learning theory, and Cryptography … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… … Wikipedia
Neural cryptography — is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially neural network algorithms, for use in encryption and cryptanalysis. Contents 1 Definition 2 Applications 3 Neural key e … Wikipedia