-
81 129 digit cryptographic security number
Information technology: RSA129 (named after its inventors: Drs. Ronald L. Rivest, Adi Shamir and Leonard M. Adleman)Универсальный русско-английский словарь > 129 digit cryptographic security number
-
82 Challenge Response For Authenticated Cryptographic Keys
Security: CRACKУниверсальный русско-английский словарь > Challenge Response For Authenticated Cryptographic Keys
-
83 Common Cryptographic Architecture
Information technology: CCAУниверсальный русско-английский словарь > Common Cryptographic Architecture
-
84 Cossor Interrogation & Reply Cryptographic Equipment
Abbreviation: CIRCEУниверсальный русско-английский словарь > Cossor Interrogation & Reply Cryptographic Equipment
-
85 Cryptography/Cryptographic
Military: CRYPTOУниверсальный русско-английский словарь > Cryptography/Cryptographic
-
86 Endorsed Cryptographic Product List
Security: ECPLУниверсальный русско-английский словарь > Endorsed Cryptographic Product List
-
87 Endorsed Cryptographic Products List
Abbreviation: ECPLУниверсальный русско-английский словарь > Endorsed Cryptographic Products List
-
88 Endorsed for Unclassified Cryptographic Information
Military: EUCIУниверсальный русско-английский словарь > Endorsed for Unclassified Cryptographic Information
-
89 International Cryptographic Framework
Information technology: ICF (HP, Verschluesselung)Универсальный русско-английский словарь > International Cryptographic Framework
-
90 Java Cryptographic Extension
Универсальный русско-английский словарь > Java Cryptographic Extension
-
91 Joint Cryptographic Centre
Универсальный русско-английский словарь > Joint Cryptographic Centre
-
92 Joint Service Cryptographic Modernization Implementation
Military: JSCMIУниверсальный русско-английский словарь > Joint Service Cryptographic Modernization Implementation
-
93 Joint Service Cryptographic Modernization Implementation Plan
Military: JSCMIPУниверсальный русско-английский словарь > Joint Service Cryptographic Modernization Implementation Plan
-
94 Marconi cryptographic equipment for HF/VHF radio
Military: MARCRYPFLEXУниверсальный русско-английский словарь > Marconi cryptographic equipment for HF/VHF radio
-
95 Marconi cryptographic equipment for data transmission
Military: MARCRYP, MARCRYPDATAУниверсальный русско-английский словарь > Marconi cryptographic equipment for data transmission
-
96 Marconi cryptographic equipment for facsimile
Military: MARCRYPFAXУниверсальный русско-английский словарь > Marconi cryptographic equipment for facsimile
-
97 Marconi cryptographic equipment for telegraph/teleprinter
Military: MARCRYPTELУниверсальный русско-английский словарь > Marconi cryptographic equipment for telegraph/teleprinter
-
98 Marconi cryptographic equipment for telephone lines
Military: MARCRYPFONEУниверсальный русско-английский словарь > Marconi cryptographic equipment for telephone lines
-
99 Marconi cryptographic equipment for trunk communications
Military: MARCRYPMUXУниверсальный русско-английский словарь > Marconi cryptographic equipment for trunk communications
-
100 Novell International Cryptographic Infrastructure
Information technology: NICIУниверсальный русско-английский словарь > Novell International Cryptographic Infrastructure
См. также в других словарях:
Cryptographic — Cryp to*graph ic (kr?p t? gr?f ?k), Cryptographical Cryp to*graph ic*al (kr?p t? gr?f ? kal), a. Relating to cryptography; written in secret characters or in cipher, or with sympathetic ink. [1913 Webster] … The Collaborative International Dictionary of English
cryptographic — adjective Relating to cryptography. The cryptographic community includes both cryptographers (those who make codes) and cryptanalysts (those who break codes) … Wiktionary
cryptographic — cryptography ► NOUN ▪ the art of writing or solving codes. DERIVATIVES cryptographer noun cryptographic adjective … English terms dictionary
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic Service Provider — (CSP) sind Komponenten (Software /Programmibliotheken) der Windows Betriebssysteme von Microsoft. Jeder CSP implementiert Funktionen der Microsoft Cryptographic API (MS CryptoAPI). Diese API bietet Programmen kryptografische Funktionen zum… … Deutsch Wikipedia
Cryptographic Test Correction — is a technique, published in 2008 by Eric Levieil and David Naccache [1] for shifting the burden of correcting Multiple Choice Questionnaires (MQC) to examinees. Because the corrector is only interested in the number of correct answers and not in … Wikipedia
Cryptographic Service Provider — (ou « CSP ») est une bibliothèque logicielle de fonctions fournie par Microsoft ou un éditeur tiers. Tout programme en C (ou C++) peut utiliser les fonctions cryptographiques fournies le CSP par l intermédiaire de l interface de… … Wikipédia en Français
Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… … Wikipedia
Cryptographic Message Syntax — (CMS) ist ein Standard vom IETF für gesicherte kryptographische Mitteilungen. CMS ist die Obermenge des PKCS #7 (Public Key Cryptography Standards #7) welche auf S/MIME aufsetzt. Der Version 2 lag der gleiche Standard zugrunde. Ab Version 3… … Deutsch Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia