-
1 криптографическая защита
1) Computers: cryptographical security2) Engineering: cryptographic protection, cryptographic security, encryption protection3) Security: ciphering, cryptoprotection, cryptosecurity, enciphering, encipherment, encryptionУниверсальный русско-английский словарь > криптографическая защита
-
2 криптографічний захист
cryptographic security, cryptographical securityУкраїнсько-англійський юридичний словник > криптографічний захист
-
3 криптографическое разделение
Универсальный русско-английский словарь > криптографическое разделение
-
4 криптологический анализ
Универсальный русско-английский словарь > криптологический анализ
-
5 криптопреобразование
Security: cryptoconversion, cryptographical transformationУниверсальный русско-английский словарь > криптопреобразование
-
6 преобразование по криптографическому алгоритму
Security: cryptographical transformationУниверсальный русско-английский словарь > преобразование по криптографическому алгоритму
-
7 криптоанализ
1) General subject: cryptanalysis2) Information technology: cryptoanalysis3) Network technologies: attack4) Security: analysis, cipher analysis, cryptographical analysis, cryptological analysis, decrypting, decryption, decryptment -
8 криптографический метод
1) Network technologies: cryptographical method2) Security: cryptographic techniqueУниверсальный русско-английский словарь > криптографический метод
-
9 криптографическое преобразование
1) General subject: encryption2) Information technology: cryptographic transformation3) Security: cryptographic processing, cryptographical transformationУниверсальный русско-английский словарь > криптографическое преобразование
См. также в других словарях:
Trace Zero Cryptography — In the year 1998 Gerhard Frey firstly purposed using trace zero varieties for cryptographic purpose. These varieties are subgroups of the divisor class group on a low genus hyperelliptic curve defined over a finite field. These groups can be used … Wikipedia
Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… … Wikipedia
Bill Weisband — William Weisband, Sr. (August 28, 1908 ndash; May 14, 1967) was an American cryptographic code analyst and Soviet NKVD agent (code name LINK ), best known for his role in revealing U.S. decryptions of Soviet diplomatic and intelligence codes to… … Wikipedia
Intelligence Corps (Israel) — The Israeli Intelligence Corps ( he. חיל המודיעין Heil HaModi in , abbreviated to Haman) is an Israel Defense Forces corps which falls under the jurisdiction of IDF Directorate of Military Intelligence (Aman) and is responsible for collecting,… … Wikipedia
Bill Weisband — William Weisband, Sr. Nacimiento 28 de agosto de 1908 Odesa … Wikipedia Español
Letter frequency — The frequency of letters in text has often been studied for use in cryptography, and frequency analysis in particular. No exact letter frequency distribution underlies a given language, since all writers write slightly differently. Linotype… … Wikipedia