-
1 cryptologic authentication
Универсальный англо-русский словарь > cryptologic authentication
-
2 cryptologic authentication
криптографическая аутентификация, аутентификация с использованием криптографических средств и методовАнгло-русский словарь по компьютерной безопасности > cryptologic authentication
-
3 authentication
аутентификация, установление подлинности (идентичности) (личности, документа, объекта), отождествлениеАнгло-русский словарь по компьютерной безопасности > authentication
-
4 аутентификация с использованием криптографических средств и методов
Универсальный русско-английский словарь > аутентификация с использованием криптографических средств и методов
-
5 криптографическая аутентификация
Универсальный русско-английский словарь > криптографическая аутентификация
-
6 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
7 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device
См. также в других словарях:
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Chaocipher — The Chaocipher [1] is a cipher method invented by J. F. Byrne in 1918 and described in his 1953 autobiographical Silent Years[2]. He believed Chaocipher was simple, yet unbreakable. Byrne stated that the machine he used to encipher his messages… … Wikipedia
Gustavus Simmons — Gustavus J. Simmons (born 1930) is a retired cryptographer and former manager of the Applied Mathematics Department at Sandia National Laboratories. He has worked primarily with authentication theory, developing cryptographic techniques for… … Wikipedia
Roger Needham — Infobox Scientist name = Roger Needham caption = Roger Needham in 1999 birth date = birth date|1935|2|9|df=y birth place = death date = death date and age|2003|3|1|1935|2|9|df=y death place = Willingham, Cambridgeshire residence = United Kingdom… … Wikipedia
Books on cryptography — have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages mdash; see Kerckhoffs principle. In… … Wikipedia
SIGSALY — exhibit at the National Cryptologic Museum In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest level Allied communications. It pioneered … Wikipedia
Clock (cryptography) — Biuro Szyfrów Methods and technology ANX · Enigma doubles · Grill Clock … Wikipedia
Navajo I — secure telephone The Navajo I is a secure telephone built into a briefcase that was developed by the U.S. National Security Agency. According to information on display in 2002 at the NSA s National Cryptologic Museum, 110 units were built in the… … Wikipedia