-
1 cryptographic hash function
криптографическая хэш-функцияEnglish-Russian cryptological dictionary > cryptographic hash function
-
2 криптографическая функция
Security: cryptographic function (цифровая подпись, генерация ключей, шифрование и др.)Универсальный русско-английский словарь > криптографическая функция
-
3 криптографическая хэш-функция
криптографическая хэш-функция
Функция, преобразующая текст произвольной длины в текст фиксированной (в большинстве случаев меньшей) длины. Основное применение хэш-функции нашли в схеме цифровой подписи. Так как хэш-функция вычисляется быстрее цифровой подписи, то вместо выработки ЭЦП для сообщения, сначала вычисляется его хэш-функция, а уже для значения хэш-функции вырабатывается ЭЦП.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > криптографическая хэш-функция
-
4 криптографическая хэш-функция
cryptographic hash, cryptographic hash-functionРусско-английский словарь по электронике > криптографическая хэш-функция
-
5 криптографическая хэш-функция
cryptographic hash, cryptographic hash-functionРусско-английский словарь по радиоэлектронике > криптографическая хэш-функция
-
6 kryptograficzna funkcja skrótu
• cryptographic hash functionSłownik polsko-angielski dla inżynierów > kryptograficzna funkcja skrótu
-
7 криптографическая контрольная функция
Универсальный русско-английский словарь > криптографическая контрольная функция
-
8 криптографическая хеш-функция
Programming: cryptographic hash-functionУниверсальный русско-английский словарь > криптографическая хеш-функция
См. также в других словарях:
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… … Wikipedia
Cryptographic API — The Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, or simply CAPI) is an application programming interface included with Microsoft Windows operating systems that provides services… … Wikipedia
Cryptographic Message Syntax — The Cryptographic Message Syntax (CMS) is the IETF s standard for cryptographically protected messages. It can be used to digitally sign, digest, authenticate or encrypt any form of digital data. CMS is based on the syntax of PKCS#7, which in… … Wikipedia
NIST hash function competition — Cryptography portal The NIST hash function competition is an open competition held by the US National Institute of Standards and Technology for a new SHA 3 function to replace the older SHA 1 and SHA 2, which was formally announced in the Federal … Wikipedia
One-way compression function — In cryptography, a one way compression function is a function that transforms two fixed length inputs to an output of the same size as one of the inputs. The transformation is one way , meaning that it is difficult given a particular output to… … Wikipedia
Bent function — The 2 ary bent functions with Hamming weight 1 Their nonlinearity is … Wikipedia
Comparison of cryptographic hash functions — The following tables compare general and technical information for a number of cryptographic hash functions.[1] Contents 1 General information 1.1 Notes 2 Compression function … Wikipedia
Hash function — A hash function is any well defined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an index into an array. The values returned by a hash function are called hash values, hash… … Wikipedia
Naor-Reingold Pseudorandom Function — In 1997, Moni Naor and Omer Reingold described efficient constructions for various cryptographic primitives in private key as well as public key cryptography. Their result is the construction of an efficient pseudorandom function. Let p and l be… … Wikipedia