-
1 cryptographic techniques
English-Russian electronics dictionary > cryptographic techniques
-
2 Cryptographic techniques
மறையீட்டு நுட்பம் -
3 multi-user cryptographic techniques
многопользовательские криптографические методы
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > multi-user cryptographic techniques
-
4 multiuser cryptographic techniques
многопользовательские криптографические методы.English-Russian cryptological dictionary > multiuser cryptographic techniques
-
5 cryptographic IFF techniques
Военный термин: методика шифрования сигналов системы РЛ опознавания "свой чужой"Универсальный англо-русский словарь > cryptographic IFF techniques
-
6 cryptographic IFF techniques
методика шифрования сигналов системы РЛ опознавания «свой — чужой»English-Russian military dictionary > cryptographic IFF techniques
-
7 криптографические методы
Русско-английский словарь по электронике > криптографические методы
-
8 криптографические методы
Русско-английский словарь по радиоэлектронике > криптографические методы
-
9 многопользовательские криптографические методы
многопользовательские криптографические методы
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > многопользовательские криптографические методы
-
10 technique
1) метод, способ; (технологический) приём2) технология3) техника; профессиональные приёмы и навыки; мастерство•- alloying technique
- angle-lap technique
- anti-aliasing technique
- back-reflection Berg-Barrett technique
- backscatter technique
- ball alloy technique
- base-emitter self-aligning technique
- batch technique
- batch-fabrication technique
- Bayesian technique
- beam lead technique
- bias-compensation technique
- Bitter technique
- black-write technique
- boat-in-solder technique
- Borrman anomalous-transmission technique
- breadth-first search technique
- bristle block technique
- brute force technique
- bubble rocking technique
- CCM techniques
- chemical-transport technique
- chemical vapor infiltration technique
- closed-tube technique
- cold-cathode technique
- cold crucible technique
- collapse technique
- counter-countermeasures techniques
- crucibleless technique
- cryogenic technique
- cryptographic techniques
- crystal-pulling technique
- crystal pushing technique
- Czochralski technique
- dark-field technique
- data storage techniques
- decoration technique
- depth-first search technique
- dialog debug technique
- diffraction Berg-Barrett technique
- digital adaptive technique for efficient communications
- diversity technique
- dot-and-dash technique
- double-diffusion technique
- double-diffusion fabrication technique
- double-doping technique
- electroless technique
- electron-beam probe technique
- electron-beam resist technique
- enumerative technique
- epi technique
- epitaxial technique
- estimation technique
- face-down technique
- fine-line technique
- flame-fusion technique
- flip-chip technique
- floating-crucible technique
- floating-zone technique
- float-zoning technique
- folded spectrum technique
- frequency hopping technique
- gas-doping technique
- gradient technique
- graphical evaluation and review technique
- grown-junction technique
- half-select technique
- harmonic mixer technique
- hollow-cathode technique
- holographic technique
- horizontal pulling technique
- horizontal crystal pulling technique
- hot-and-cold load technique
- hot-pressing technique
- incremental time technique
- integrated technique
- interface-alloy technique
- interference technique
- inverted-mesa processing technique
- inverted mounted technique
- ion-implantation technique
- iterative technique
- jet-etching technique
- jet-solder technique
- Kruger-Finke technique
- lenticular color technique
- macrocell technique
- masking technique
- mason-jar technique
- meltback technique
- melt-quench technique
- mesa technique
- microalloy technique
- microelectronic technique
- microstrip technique
- microwave technique
- modified digital adaptive technique for efficient communications
- Monte-Carlo technique
- moving-mask technique
- multijunction epitaxial technique
- multimicrophone technique
- multiple-access technique
- multiple-color-filters technique
- multiplexer technique
- near-field technique
- normal-freezing technique
- one-probe technique
- one-way scheduling technique
- open-tube technique
- optical heterodyne technique
- pedestal technique
- photolithographic technique
- photoprocessing technique
- piston-crucible technique
- planar-epitaxial technique
- post-alloy-diffusion technique
- powder-pattern technique
- printed-circuit technique
- program evaluation and review technique
- programmed growth rate technique
- proton guard-ring implant technique
- pulse technique
- pulse-alloying technique
- pyrolitic-deposition technique
- RAD technique
- rapid application development technique
- salami technique
- scaling technique
- scan-in, scan-out technique
- schlieren technique
- sequential weight increasing factor technique
- silk-screening technique
- simulation technique
- simultaneous iterative reconstruction technique
- single-mask technique
- slip-mat fast-start technique
- solder-ball technique
- solder-reflow technique
- solder transfer application technique
- solid-state technique
- solution-regrowth technique
- solvent-evaporation technique
- spread-spectrum technique
- sputtering technique
- strain-annealed technique
- structured analysis and design technique
- subtractive color technique
- surface-melting technique
- template matching technique
- testing technique
- thermal-gradient technique
- thermal-wave technique
- thermocompression technique
- thick-film technique
- thin-film technique
- transmission Berg-Barrett technique
- two-turntable quick-start technique
- vacuum-deposition technique
- vacuum-evaporation technique
- vapor-plating technique
- Verneuil technique
- vertical pulling technique
- vertical crystal pulling technique
- wave soldering technique
- weight-counting technique
- white-write technique
- zone-leveling technique
- zone-melting technique -
11 technique
техника; ( совокупность приемов) ; методика, метод; способ, прием; тактика; процедура; технология"one-point, two sides" technique — разг. тактика нанесения одновременных сходящихся ударов с двух направлений
lead (talk) technique (to direct aeroweapons to an attack position) — порядок вывода ударных вертолетов в положение для атаки целей (наведением с земли или с ВКП)
-
12 методика шифрования сигналов системы РЛ опознавания свой чужой
Military: cryptographic IFF techniquesУниверсальный русско-английский словарь > методика шифрования сигналов системы РЛ опознавания свой чужой
См. также в других словарях:
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic Test Correction — is a technique, published in 2008 by Eric Levieil and David Naccache [1] for shifting the burden of correcting Multiple Choice Questionnaires (MQC) to examinees. Because the corrector is only interested in the number of correct answers and not in … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… … Wikipedia
Cryptanalysis of TIA's Common Cryptographic Algorithms — In 1992, the TR 45 working group within the Telecommunications Industry Association (TIA) developed a standard for integration of cryptographic technology into tomorrow s digital cellular systems [TIA92] , which has been updated at least once… … Wikipedia
Public Key Cryptographic Standards — Les PKCS (Public Key Cryptographic Standards), ou standards de cryptographie à clé publique, sont un ensemble de spécifications conçues par les laboratoires RSA en Californie. La société RSA Security est spécialisée dans les solutions de sécurité … Wikipédia en Français
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
CRYPTREC — is the Cryptography Research and Evaluation Committee set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. It is comparable in many respects to the European Union s NESSIE project … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia