-
1 key exchange algorithm
алгоритм обмена ключами
AOK
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > key exchange algorithm
-
2 key exchange algorithm
Безопасность: алгоритм ключевого обмена, алгоритм обмена ключамиУниверсальный англо-русский словарь > key exchange algorithm
-
3 key exchange algorithm
алгоритм обмена ключами (ключевого обмена)Англо-русский словарь по компьютерной безопасности > key exchange algorithm
-
4 Diffie-Hellman key exchange algorithm
алгоритм обмена ключами Диффи-Хеллмана
Протокол защищенного обмена ключей; назван по имени его разработчиков W. Diffie и M. Hellman. Протокол позволяет участникам договориться об используемом ключе по незащищенному каналу.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > Diffie-Hellman key exchange algorithm
-
5 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
6 algorithm
- ad hoc algorithm
- adaptive algorithm
- aim algorithm
- algorithm for path connections
- automatic assessment algorithm
- back-propagation algorithm
- banker's algorithm
- best-route algorithm
- bicomponent algorithm
- bipartitioning algorithm
- bisection algorithm
- branch-bound algorithm
- branching algorithm
- cascading algorithm
- chain algorithm
- channel router algorithm
- coarse-to-fine algorithm
- column sweep algorithm
- combinatorial algorithm
- computational algorithm
- computing algorithm
- conservative algorithm
- control algorithm
- convergent algorithm
- curve-fitting algorithm
- cutting-plane algorithm
- D-algorithm
- decision algorithm
- decoding algorithm
- demand-paging algorithm
- deterministic algorithm
- digit-by-digit algorithm
- divide-and-conquer algorithm
- double-sweep algorithm
- draphics algorithm
- drawing algorithm
- DSP algorithm
- dual algorithm
- durable algorithm
- earliest-deadline-first algorithm
- edge-based algorithm
- event-scheduling algorithm
- exchange algorithm
- fault-handling algorithm
- fine-to-coarse algorithm
- fixed-stealing algorithm
- fixed-step-size algorithm
- flow-synthesis algorithm
- forward-looking algorithm
- generalized algorithm
- genetic algorithm
- Goto algorithm
- graph algorithm
- graph traversal algorithm
- greedy algorithm
- grid expansion algorithm
- hardware algorithm
- heuristic algorithm
- Hightower algorithm
- incorrect algorithm
- inference-based algorithm
- inferencing algorithm
- instruction issue algorithm
- integer algorithm
- integrated query optimization algorithm
- iteration algorithm
- iterative algorithm
- layout algorithm
- layout copmaction algorithm
- leaky bucket algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-expansion algorithm
- Lee-type algorithm
- levelization algorithm
- linear expansion algorithm
- line-placing algorithm
- line-probe algorithm
- logical algorithm
- mathematically based algorithm
- mathematically intensive algorithm
- maximum matching algorithm
- mesh algorithm - minimum path-length algorithm
- modeling algorithm
- multikey algorithm
- multipass algorithm
- nested algorithm
- network algorithm
- normal algorithm
- no-wait algorithm
- operative algorithm
- optimal assignment algorithm
- optimal cutting algorithm
- ordering algorithm
- page-replacement algorithm
- paging algorithm
- parallel algorithm
- partitioning algorithm
- path-tracing algorithm
- pipeline algorithm
- pitch algorithm
- placement algorithm
- prediction algorithm
- primal-dual algorithm
- primary algorithm
- problem algorithm
- procrastination algorithm
- public-key algorithm
- quorum-based algorithm
- random search algorithm
- recognition algorithm
- recursive algorithm
- relaxation algorithm
- replicate algorithm
- robust algorithm
- round-robin algorithm
- routing algorithm
- scanline algorithm
- scheduling algorithm
- sequential algorithm
- shortest path algorithm
- shrinking algorithm
- simplex algorithm
- simulated annealing algorithm
- software algorithm
- spanning tree algorithm
- speech generation algorithm
- speed-enhancing algorithm
- square rooting algorithm
- steepest ascent algorithm
- systolic algorithm
- testing algorithm
- text-to-speech algorithm
- threshold decoding algorithm
- timetable scheduling algorithm
- trace back algorithm
- translation algorithm
- transportation algorithm
- tree-search algorithm
- two-dimensional placement algorithm
- two-list algorithm
- type-inferencing algorithm
- unconstrained minimization algorithm
- universal algorithm
- variable-stealing algorithm
- Vintr algorithm
- VLSI algorithm
- write-back algorithmEnglish-Russian dictionary of computer science and programming > algorithm
-
7 KEA
1) Военный термин: Key Exchange Algorithm2) Грубое выражение: Kill Em All3) Безопасность: Known Exponent Attack4) AMEX. Keane, Inc. -
8 Kea
1) Военный термин: Key Exchange Algorithm2) Грубое выражение: Kill Em All3) Безопасность: Known Exponent Attack4) AMEX. Keane, Inc. -
9 kea
1) Военный термин: Key Exchange Algorithm2) Грубое выражение: Kill Em All3) Безопасность: Known Exponent Attack4) AMEX. Keane, Inc. -
10 KEA
сокр. от key exchange algorithmалгоритм обмена ключами (ключевого обмена) -
11 KEA
алгоритм обмена ключами
AOK
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > KEA
-
12 D-H
алгоритм обмена ключами Диффи-Хеллмана
Протокол защищенного обмена ключей; назван по имени его разработчиков W. Diffie и M. Hellman. Протокол позволяет участникам договориться об используемом ключе по незащищенному каналу.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
предположение Диффи-Хеллмана
В 1976 г. американские криптологи У. Диффи и М. Хеллман высказали предположение о том, что невозможно вычислить g в степени ah, зная только g и gh.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > D-H
См. также в других словарях:
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
Diffie-Hellman key exchange — (D H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications… … Wikipedia
Internet Key Exchange — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Internet Key Exchange Protocol — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Internet Key Exchange Protokoll — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Algorithm — Flow chart of an algorithm (Euclid s algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≤ A yields yes… … Wikipedia
Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… … Wikipedia