-
1 cryptographic bit stream
Универсальный англо-русский словарь > cryptographic bit stream
-
2 generator
- pseudorandom sequence generatorАнгло-русский словарь по компьютерной безопасности > generator
-
3 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
4 machine
1) машина; механизм; устройство || машинный2) вычислительная машина; счётная машина (см. тж calculator, computer)3) редк. процессор•- adding machine
- alphanumeric machine
- alphameric machine
- artificial intelligence machine
- backup machine
- bad machine
- bare machine
- betting machine
- Boltzmann machine
- bookkeeping machine
- bottom-up machine
- bridge machine
- business calculating machine
- business machine
- butterfly machine
- calculating machine
- card-punching machine
- card-punch machine
- card-to-tape machine
- cellular automata machine
- character-oriented machine
- cipher machine
- clerical machine
- clock machine
- code machine
- collating machine
- computer assisted drafting machine
- computing machine
- connection machine
- cryptographic machine
- data flow machine
- data processing machine
- data structure machine
- database machine
- data-driven machine
- determinate machine
- diagnostic machine
- dictating machine
- direct-coupled machines
- document-originating machine
- duplex calculating machine
- electric calculating machine
- electromechanical machine
- electronic accounting machine
- electronic punch-card machine
- finite memory machine
- finite state machine
- friendly machine
- fully redundant machine
- game-playing machine
- game machine
- ganged machine
- good machine
- hardcopy machine
- hardware-realized machine
- inference machine
- information processing machine
- information-logical machine
- information-lossless machine
- key punch machine
- knowledge machine
- knowledgebase machine
- language-specific machine
- learning machine
- Lisp-based machine
- Lisp machine
- logger machine
- logical machine
- logic machine
- long wordlength machine
- Markovian machine
- maze-solving machine
- microprogrammable machine
- MIMD machine
- MS-DOS machine
- multiple-instruction multiple-data stream machine
- multiple-instruction multiple-data machine
- N/C machine
- N-bit machine
- NC machine
- network access machine
- non-numeric machine
- non-speculating machine
- non-Von-Neumann machine
- N-state machine
- numerical control machine
- object machine
- object-based machine
- OS implemented abstract machine
- paged machine
- parallel machine
- physical machine
- playing machine
- plotting machine
- POS machine
- protocol machine
- punched card machine
- punch card machine
- punched-tape machine
- pyramid-vision machine
- reading machine
- reduction machine
- relational algebra machine
- reservation machine
- scalar machine
- scanning machine
- self-organizing machine
- self-replicatind machine
- sequential machine
- sequential-processor machine
- serial machine
- series machine
- SIMD machine
- single-instruction multiple-data stream machine
- single-instruction multiple-data machine
- single-user machine
- sorting machine
- sound machine
- source machine
- speaker recognition machine
- stack machine
- state machine
- statistical machine
- super inference machine
- symbol-manipulatind machine
- tabulating machine
- tagged-token machine
- tag-token machine
- tape-operated machine
- target machine
- teaching machine
- teller machine
- thinking machine
- top-down machine
- transformation machine
- translating machine
- Turing machine
- user machine
- vector machine
- virtual machine
- Von Neumann machineEnglish-Russian dictionary of computer science and programming > machine
-
5 mode
-
6 regime
См. также в других словарях:
Stream cipher — The operation of the keystream generator in A5/1, a LFSR based stream cipher used to encrypt mobile phone conversations. In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Bit-flipping attack — A bit flipping attack is an attack on a cryptographic cipher in which the attacker can change the ciphertext in such a way as to result in a predictable change of the plaintext, although the attacker is not able to learn the plaintext itself.… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Cryptanalysis of TIA's Common Cryptographic Algorithms — In 1992, the TR 45 working group within the Telecommunications Industry Association (TIA) developed a standard for integration of cryptographic technology into tomorrow s digital cellular systems [TIA92] , which has been updated at least once… … Wikipedia
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Cryptographically secure pseudorandom number generator — A cryptographically secure pseudo random number generator (CSPRNG) is a pseudo random number generator (PRNG) with properties that make it suitable for use in cryptography. Many aspects of cryptography require random numbers, for example: Key… … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
LM hash — Lanman redirects here. For other uses, see Lanman (disambiguation). LM hash, LanMan, or LAN Manager hash was the primary hash that Microsoft LAN Manager and Microsoft Windows versions prior to Windows NT used to store user passwords. Support for… … Wikipedia