-
1 decryption error
Программирование: ошибка дешифровки -
2 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 logic
1) логика2) логическая часть, логический узел ( ЭВМ)3) логическая схема; логические схемы, логика•- adaptive logic
- address-comparison logic
- address-recognition logic
- address-selection logic
- all-magnetic logic
- all-transistor logic
- arbitration logic
- arithmetic logic
- binary logic
- bipolar logic
- Boolean logic
- carry determination logic
- cellular logic
- circuit logic
- clocked logic
- closed-cell logic
- combinational logic
- combinatorial logic
- combinatory logic
- command decode logic
- comparison logic
- compatible logic
- complementary transistor logic
- complementary transistor-resistor logic
- computer logic
- constructive logic
- control logic
- core logic
- crisp logic
- current injection logic
- current mode logic
- current sinking logic
- current steering logic
- current-hogging logic
- custom logic
- data manipulation logic
- decryption logic
- degating logic
- derivative logic
- designer choice logic
- design-for-test logic
- differential logic
- digit logic
- diode logic
- diode-emitter coupled logic
- diode-transistor logic
- direct-coupled transistor logic
- distributed logic
- double-rail logic
- emitter-emitter-coupled transistor logic
- emitter-coupled transistor logic
- emitter-emitter-coupled logic
- emitter-coupled logic
- emitter-follower logic
- epistemic logic
- error-checking logic
- failure detection logic
- fault-masking logic
- feature logic
- field-programmable logic
- fluid logic
- formal logic
- fuzzy logic
- glue logic
- hardwired logic
- high-noise-immunity logic
- high-threshold logic
- Hoare logic
- incremental logic
- inferencial logic
- injection-coupled logic
- instruction logic
- integrated injection logic
- interface logic
- interrupt logic
- irregular logic
- Josephson junction logic
- kindred logic
- ladder logic
- level logic
- linearly independent logic
- locked-pair logic
- logic under test
- low level logic
- machine logic
- magneto-optical logic
- majority-vote logic
- majority logic
- many-valued logic
- mathematical logic
- merged logic
- merged-transistor logic
- microprogrammed logic
- microwatt logic
- microwave logic
- modal logic
- modified diode-transistor logic
- morphic logic
- multiple-valued logic
- multi-valued logic
- multiaperture device logic
- multihpase pulse logic
- nanosecond logic
- negative logic
- N-level logic
- nonmonotonic logic
- N-out-of-M logic
- N-valued logic
- on-board logic
- on-chip control logic
- optoelectronic logic
- out-of-order issue logic
- paging logic
- parametron logic
- path programmable logic
- per-bit logic
- philosophical logic
- positive logic
- possibilistic logic
- probabilistic logic
- processing logic
- programmable array logic
- programmable logic
- programmed logic
- quadded logic
- random logic
- random sequential logic
- recovery logic
- reference logic
- regular logic
- relay logic
- relevance logic
- resistor-capacitor-transistor logic
- resistor-coupled transistor logic
- resistor-diode-transistor logic
- resistor-transistor logic
- ripple-carry logic
- save-carry logic
- Schottky transistor-transistor logic
- sector-buffering logic
- self-checking logic
- self-timed logic
- sequential logic
- single-phase pulse logic
- single-sorted logic
- solid-state logic
- stored logic
- structured logic
- switching logic
- symbolic logic
- temporal logic
- ternary logic
- test logic
- three-level logic
- three-state logic
- three-value logic
- threshold logic
- timed-access logic
- timing logic
- transaction logic
- transister logic
- transistor-coupled logic
- transistor-diode logic
- transistor-resistor logic
- transistor-transistor logic
- tri-state logic
- tube-and-diode logic
- tunnel-diode logic
- two-valued logic
- unconditional logic
- user-definable logic
- variable logic
- variable threshold logic
- vertical injection logic
- wired logic
- wired-OR, wired-AND logic
- word logicEnglish-Russian dictionary of computer science and programming > logic
См. также в других словарях:
Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Ciphertext stealing — In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting in any expansion of the ciphertext, at the … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… … Wikipedia
Global Positioning System — GPS redirects here. For other uses, see GPS (disambiguation). Geodesy Fundamentals … Wikipedia
RSA — In cryptography, RSA is an algorithm for public key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic… … Wikipedia
Marian Rejewski — (probably 1932, the year he first solved the Enigma machine). Courtesy of Janina Sylwestrzak, Rejewski s daughter. Born Marian Adam Rejewski August 16, 1905(1905 0 … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Encrypting File System — The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS[1] that provides filesystem level encryption. The technology enables files to be transparently encrypted to protect confidential data from… … Wikipedia