-
1 Cryptographic FileSystem
Information technology: CFS (Linux, Verschluesselung)Универсальный русско-английский словарь > Cryptographic FileSystem
-
2 Cryptographic Message Syntax
Универсальный русско-английский словарь > Cryptographic Message Syntax
-
3 cryptographic service provider
Information technology: CSPУниверсальный русско-английский словарь > cryptographic service provider
-
4 129 digit cryptographic security number
Information technology: RSA129 (named after its inventors: Drs. Ronald L. Rivest, Adi Shamir and Leonard M. Adleman)Универсальный русско-английский словарь > 129 digit cryptographic security number
-
5 Common Cryptographic Architecture
Information technology: CCAУниверсальный русско-английский словарь > Common Cryptographic Architecture
-
6 International Cryptographic Framework
Information technology: ICF (HP, Verschluesselung)Универсальный русско-английский словарь > International Cryptographic Framework
-
7 Java Cryptographic Extension
Универсальный русско-английский словарь > Java Cryptographic Extension
-
8 Novell International Cryptographic Infrastructure
Information technology: NICIУниверсальный русско-английский словарь > Novell International Cryptographic Infrastructure
-
9 Transparent Cryptographic FileSystem
Information technology: TCFS (Linux, Verschluesselung)Универсальный русско-английский словарь > Transparent Cryptographic FileSystem
-
10 digital cryptographic security agent
Information technology: DCSAУниверсальный русско-английский словарь > digital cryptographic security agent
-
11 криптографическая техника
Универсальный русско-английский словарь > криптографическая техника
-
12 технология изготовления криптографической аппаратуры
Security: cryptographic technologyУниверсальный русско-английский словарь > технология изготовления криптографической аппаратуры
-
13 шифратор
1) General subject: encryptor2) Military: cryptographic set, message encoder unit, security coding device3) Engineering: cipherer, coder, coding device, data encryption unit, encipherer, encoder, encoder matrix, encoding device, scrambler (телевизионной передачи)4) Telecommunications: quantizer5) Electronics: encipher6) Information technology: cryptograph7) Household appliances: encryption device8) Microelectronics: dongle9) Automation: code device10) Makarov: matrix11) Security: cipher device, cipher set, cipher unit, ciphering device, crypto unit, (механический) cryptograph, cryptographic device, cryptographic unit, cryptography coder, cryptopackage, cryptor, encrypter, encryption gear, encryption item, encryption product, encryption unit -
14 криптографическое преобразование
1) General subject: encryption2) Information technology: cryptographic transformation3) Security: cryptographic processing, cryptographical transformationУниверсальный русско-английский словарь > криптографическое преобразование
-
15 шифровальная аппаратура
1) Telecommunications: cryptographic equipment2) Information technology: cryptographic hardwareУниверсальный русско-английский словарь > шифровальная аппаратура
-
16 блок шифрования
1) Information technology: encryption engine, encryptor2) Security: cipher unit, crypto unit, cryptographic unit, encryption unit -
17 криптоалгоритм
1) Information technology: cryptoalgorithm2) Security: cryption algorithm, cryptographic algorithm, encryption algorithm -
18 криптографическая машина
1) Information technology: cipher machine, cryptographic machine2) Cryptography: cryptomachineУниверсальный русско-английский словарь > криптографическая машина
-
19 программа шифрования
1) Information technology: encryption program2) Security: cipher code, cryptic code, cryptographic code, cryptography program, encrypting programУниверсальный русско-английский словарь > программа шифрования
-
20 средство криптографической защиты
Information technology: cryptographic toolУниверсальный русско-английский словарь > средство криптографической защиты
- 1
- 2
См. также в других словарях:
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… … Wikipedia
Cryptographic Modernization Program — The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases: Replacement All … Wikipedia
Cryptographic Module Testing Laboratory — A Cryptographic Module Testing Laboratory (CMTL) is an information technology (IT) computer security testing laboratory that is accredited to conduct cryptographic module evaluations for conformance to the FIPS 140 2 U.S. Government standard. The … Wikipedia
Cryptographic Service Provider — In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to… … Wikipedia
Cryptographic Module Validation Program — Logo of the Cryptographic Module Validation Program. The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to … Wikipedia
Cryptanalysis of TIA's Common Cryptographic Algorithms — In 1992, the TR 45 working group within the Telecommunications Industry Association (TIA) developed a standard for integration of cryptographic technology into tomorrow s digital cellular systems [TIA92] , which has been updated at least once… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
Young Scientist and Technology Exhibition — The BT Young Scientist and Technology Exhibition ( ga. Taispeántas na nEolaí Óga agus Teicneoilíochta), commonly called the Young Scientist , is an annual competition held in Dublin, Ireland every January for encouraging interest in science in… … Wikipedia
Whitfield Diffie — Diffie redirects here. For the country music singer, see Joe Diffie. Whitfield Diffie Born June 5, 1944 … Wikipedia
Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… … Wikipedia