-
1 cryptographic technique
Безопасность: криптографическая техника, криптографический методУниверсальный англо-русский словарь > cryptographic technique
-
2 cryptographic technique
криптографический метод, криптографическая техника и технологияАнгло-русский словарь по компьютерной безопасности > cryptographic technique
-
3 two-key cryptographic technique
метод двухключевой криптографии, двухключевой методАнгло-русский словарь по компьютерной безопасности > two-key cryptographic technique
-
4 technique
Англо-русский словарь по компьютерной безопасности > technique
-
5 technique
1) метод, способ; (технологический) приём2) технология3) техника; профессиональные приёмы и навыки; мастерство•- alloying technique
- angle-lap technique
- anti-aliasing technique
- back-reflection Berg-Barrett technique
- backscatter technique
- ball alloy technique
- base-emitter self-aligning technique
- batch technique
- batch-fabrication technique
- Bayesian technique
- beam lead technique
- bias-compensation technique
- Bitter technique
- black-write technique
- boat-in-solder technique
- Borrman anomalous-transmission technique
- breadth-first search technique
- bristle block technique
- brute force technique
- bubble rocking technique
- CCM techniques
- chemical-transport technique
- chemical vapor infiltration technique
- closed-tube technique
- cold-cathode technique
- cold crucible technique
- collapse technique
- counter-countermeasures techniques
- crucibleless technique
- cryogenic technique
- cryptographic techniques
- crystal-pulling technique
- crystal pushing technique
- Czochralski technique
- dark-field technique
- data storage techniques
- decoration technique
- depth-first search technique
- dialog debug technique
- diffraction Berg-Barrett technique
- digital adaptive technique for efficient communications
- diversity technique
- dot-and-dash technique
- double-diffusion technique
- double-diffusion fabrication technique
- double-doping technique
- electroless technique
- electron-beam probe technique
- electron-beam resist technique
- enumerative technique
- epi technique
- epitaxial technique
- estimation technique
- face-down technique
- fine-line technique
- flame-fusion technique
- flip-chip technique
- floating-crucible technique
- floating-zone technique
- float-zoning technique
- folded spectrum technique
- frequency hopping technique
- gas-doping technique
- gradient technique
- graphical evaluation and review technique
- grown-junction technique
- half-select technique
- harmonic mixer technique
- hollow-cathode technique
- holographic technique
- horizontal pulling technique
- horizontal crystal pulling technique
- hot-and-cold load technique
- hot-pressing technique
- incremental time technique
- integrated technique
- interface-alloy technique
- interference technique
- inverted-mesa processing technique
- inverted mounted technique
- ion-implantation technique
- iterative technique
- jet-etching technique
- jet-solder technique
- Kruger-Finke technique
- lenticular color technique
- macrocell technique
- masking technique
- mason-jar technique
- meltback technique
- melt-quench technique
- mesa technique
- microalloy technique
- microelectronic technique
- microstrip technique
- microwave technique
- modified digital adaptive technique for efficient communications
- Monte-Carlo technique
- moving-mask technique
- multijunction epitaxial technique
- multimicrophone technique
- multiple-access technique
- multiple-color-filters technique
- multiplexer technique
- near-field technique
- normal-freezing technique
- one-probe technique
- one-way scheduling technique
- open-tube technique
- optical heterodyne technique
- pedestal technique
- photolithographic technique
- photoprocessing technique
- piston-crucible technique
- planar-epitaxial technique
- post-alloy-diffusion technique
- powder-pattern technique
- printed-circuit technique
- program evaluation and review technique
- programmed growth rate technique
- proton guard-ring implant technique
- pulse technique
- pulse-alloying technique
- pyrolitic-deposition technique
- RAD technique
- rapid application development technique
- salami technique
- scaling technique
- scan-in, scan-out technique
- schlieren technique
- sequential weight increasing factor technique
- silk-screening technique
- simulation technique
- simultaneous iterative reconstruction technique
- single-mask technique
- slip-mat fast-start technique
- solder-ball technique
- solder-reflow technique
- solder transfer application technique
- solid-state technique
- solution-regrowth technique
- solvent-evaporation technique
- spread-spectrum technique
- sputtering technique
- strain-annealed technique
- structured analysis and design technique
- subtractive color technique
- surface-melting technique
- template matching technique
- testing technique
- thermal-gradient technique
- thermal-wave technique
- thermocompression technique
- thick-film technique
- thin-film technique
- transmission Berg-Barrett technique
- two-turntable quick-start technique
- vacuum-deposition technique
- vacuum-evaporation technique
- vapor-plating technique
- Verneuil technique
- vertical pulling technique
- vertical crystal pulling technique
- wave soldering technique
- weight-counting technique
- white-write technique
- zone-leveling technique
- zone-melting technique -
6 technique
техника; ( совокупность приемов) ; методика, метод; способ, прием; тактика; процедура; технология"one-point, two sides" technique — разг. тактика нанесения одновременных сходящихся ударов с двух направлений
lead (talk) technique (to direct aeroweapons to an attack position) — порядок вывода ударных вертолетов в положение для атаки целей (наведением с земли или с ВКП)
См. также в других словарях:
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic Test Correction — is a technique, published in 2008 by Eric Levieil and David Naccache [1] for shifting the burden of correcting Multiple Choice Questionnaires (MQC) to examinees. Because the corrector is only interested in the number of correct answers and not in … Wikipedia
Public Key Cryptographic Standards — Les PKCS (Public Key Cryptographic Standards), ou standards de cryptographie à clé publique, sont un ensemble de spécifications conçues par les laboratoires RSA en Californie. La société RSA Security est spécialisée dans les solutions de sécurité … Wikipédia en Français
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Chaffing and winnowing — is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with… … Wikipedia
William F. Friedman — Infobox Engineer image width = 180px caption = William F. Friedman name = William F. Friedman nationality = United States birth date = September 24, 1891 birth place = Kishinev, Bessarabia death date = November 12, 1969 death place = education =… … Wikipedia
Deniable encryption — In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it[citation needed]. Such convincing denials may or may not be genuine.… … Wikipedia
CRYPTREC — CRYPTREC Cryptography Research and Evaluation Committees, основаны японским правительством, для оценки и рекомендации шифровальных методов для правительственного и индустриального использования. CRYPTREC привлек передовых криптографов всего … Википедия
Rabin cryptosystem — The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization. However the Rabin cryptosystem has the advantage that the problem on which it relies has been proved … Wikipedia
Visual cryptography — is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers.Visual cryptography was pioneered by… … Wikipedia
ARIA (cipher) — Infobox block cipher name = ARIA designers = publish date = 2003 derived from = AES derived to = related to = certification = South Korean standard key size = 128, 192, or 256 bits block size = 128 bits structure = Substitution permutation… … Wikipedia