-
1 computationally secure system
Безопасность: вычислительно стойкая криптосистема, вычислительно стойкая системаУниверсальный англо-русский словарь > computationally secure system
-
2 computationally secure system
1) вычислительно стойкая (крипта) система2) вычислительно-безопасная (вычислительно-стойкая) криптосистемаАнгло-русский словарь по компьютерной безопасности > computationally secure system
-
3 computationally secure (crypto)system
вычислительно-безопасная (вычислительно-стойкая) криптосистемаАнгло-русский словарь по компьютерной безопасности > computationally secure (crypto)system
-
4 computationally secure (crypto)system
вычислительно-безопасная (вычислительно-стойкая) криптосистемаАнгло-русский словарь по компьютерной безопасности > computationally secure (crypto)system
-
5 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
6 cryptography
= crypto(от греч. cryptos - тайный) искусство, наука и технология обеспечения секретности важной информации, её защиты от изменений и неавторизованного доступа при передаче по каналам связи и/или хранении; широко использует математические методы, связанные с большими объёмами вычислений (computationally intensive). История криптографии делится на два периода - донаучный (prescientific) и период научной криптографии, начавшийся в 1949 г. с выхода статьи К. Шеннона (С. Е. Shannon) "Communication Theory of Secrecy Systems". В криптографии предполагается, что противник может перехватить зашифрованное сообщение, но без знания ключа, даже если сам способ шифрования известен, не может прочитать это сообщение в течение времени, определяемом криптографической стойкостью шифра (cryptographic strength).One of the first steps in building a secure embedded system is to see if cryptography is actually needed. — Один из первых шагов в построении безопасной встроенной системы заключается в том, чтобы решить, действительно ли необходима для неё криптография
Ant:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > cryptography
См. также в других словарях:
X Window System — X11 redirects here. For other uses, see X11 (disambiguation). A historical example of graphical user interface and applications common to the MIT X Consortium s distribution running under the twm window manager: X Terminal, Xbiff, xload and a… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Folding@home — Original author(s) Vijay Pande Developer(s) Stanford University / Pande lab Initial release 2000 10 01 … Wikipedia
Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… … Wikipedia
Cayley-Purser algorithm — The Cayley Purser algorithm was a public key cryptography algorithm published in early 1999 by 16 year old Irishwoman Sarah Flannery, based on an unpublished work by Michael Purser, founder of Baltimore Technologies, a Dublin data security… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Commitment scheme — In cryptography, a commitment scheme allows one to commit to a value while keeping it hidden, with the ability to reveal the committed value later. Commitments are used to bind a party to a value so that they cannot adapt to other messages in… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Crypt (Unix) — In Unix computing, crypt is the name of both a commonly available utility program and a C programming function. Though both are used for encrypting data, they are otherwise essentially unrelated. To distinguish between the two, writers often… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia