-
1 key generation algorithm
1) Безопасность: алгоритм выработки ключей, алгоритм генерирования ключей2) Криптография: алгоритм генерации ключейУниверсальный англо-русский словарь > key generation algorithm
-
2 key generation algorithm
<08> алгоритм генерации ключей -
3 key generation algorithm
Англо-русский словарь по компьютерной безопасности > key generation algorithm
-
4 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
5 algorithm
- ad hoc algorithm
- adaptive algorithm
- aim algorithm
- algorithm for path connections
- automatic assessment algorithm
- back-propagation algorithm
- banker's algorithm
- best-route algorithm
- bicomponent algorithm
- bipartitioning algorithm
- bisection algorithm
- branch-bound algorithm
- branching algorithm
- cascading algorithm
- chain algorithm
- channel router algorithm
- coarse-to-fine algorithm
- column sweep algorithm
- combinatorial algorithm
- computational algorithm
- computing algorithm
- conservative algorithm
- control algorithm
- convergent algorithm
- curve-fitting algorithm
- cutting-plane algorithm
- D-algorithm
- decision algorithm
- decoding algorithm
- demand-paging algorithm
- deterministic algorithm
- digit-by-digit algorithm
- divide-and-conquer algorithm
- double-sweep algorithm
- draphics algorithm
- drawing algorithm
- DSP algorithm
- dual algorithm
- durable algorithm
- earliest-deadline-first algorithm
- edge-based algorithm
- event-scheduling algorithm
- exchange algorithm
- fault-handling algorithm
- fine-to-coarse algorithm
- fixed-stealing algorithm
- fixed-step-size algorithm
- flow-synthesis algorithm
- forward-looking algorithm
- generalized algorithm
- genetic algorithm
- Goto algorithm
- graph algorithm
- graph traversal algorithm
- greedy algorithm
- grid expansion algorithm
- hardware algorithm
- heuristic algorithm
- Hightower algorithm
- incorrect algorithm
- inference-based algorithm
- inferencing algorithm
- instruction issue algorithm
- integer algorithm
- integrated query optimization algorithm
- iteration algorithm
- iterative algorithm
- layout algorithm
- layout copmaction algorithm
- leaky bucket algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-expansion algorithm
- Lee-type algorithm
- levelization algorithm
- linear expansion algorithm
- line-placing algorithm
- line-probe algorithm
- logical algorithm
- mathematically based algorithm
- mathematically intensive algorithm
- maximum matching algorithm
- mesh algorithm - minimum path-length algorithm
- modeling algorithm
- multikey algorithm
- multipass algorithm
- nested algorithm
- network algorithm
- normal algorithm
- no-wait algorithm
- operative algorithm
- optimal assignment algorithm
- optimal cutting algorithm
- ordering algorithm
- page-replacement algorithm
- paging algorithm
- parallel algorithm
- partitioning algorithm
- path-tracing algorithm
- pipeline algorithm
- pitch algorithm
- placement algorithm
- prediction algorithm
- primal-dual algorithm
- primary algorithm
- problem algorithm
- procrastination algorithm
- public-key algorithm
- quorum-based algorithm
- random search algorithm
- recognition algorithm
- recursive algorithm
- relaxation algorithm
- replicate algorithm
- robust algorithm
- round-robin algorithm
- routing algorithm
- scanline algorithm
- scheduling algorithm
- sequential algorithm
- shortest path algorithm
- shrinking algorithm
- simplex algorithm
- simulated annealing algorithm
- software algorithm
- spanning tree algorithm
- speech generation algorithm
- speed-enhancing algorithm
- square rooting algorithm
- steepest ascent algorithm
- systolic algorithm
- testing algorithm
- text-to-speech algorithm
- threshold decoding algorithm
- timetable scheduling algorithm
- trace back algorithm
- translation algorithm
- transportation algorithm
- tree-search algorithm
- two-dimensional placement algorithm
- two-list algorithm
- type-inferencing algorithm
- unconstrained minimization algorithm
- universal algorithm
- variable-stealing algorithm
- Vintr algorithm
- VLSI algorithm
- write-back algorithmEnglish-Russian dictionary of computer science and programming > algorithm
-
6 A8
Англо-русский cловарь терминов и сокращений по мобильной радиосвязи стандарта GSM > A8
-
7 A8
Телефония; Wireless Ciphering Key Generation AlgorithmEnglish-Russian dictionary of computer abbreviations and terms > A8
-
8 control
управление, регулирование, регулировать, управлять, управляющее воздействие, сигнал управления, контроль, контролировать, устройство управления, управляющее устройство, регулятор, средства управления
– control accuracy
– control action
– control algorithm
– control arm
– control block
– control box
– control bus
– control button
– control cabinet
– control capabilities
– control change
– control chart
– control circuit
– control code
– control coefficient
– control command
– control computation
– control computer
– control console
– control construct
– control criterion
– control cubicle
– control current
– control data
– control decomposition
– control desk
– control device
– control domain
– control dynamics
– control electronics
– control element
– control equipment
– control error
– control facilities
– control flexibility
– control flow
– control force
– control function
– control gear
– control hand
– control hardware
– control hierarchy
– control holes
– control input
– control input device
– control instruction
– control interval
– control key
– control keyboard
– control knob
– control lag
– control law
– control layer
– control level
– control lever
– control limit
– control line
– control list
– control logic
– control loop
– control material
– control means
– control mechanism
– control memory
– control message
– control mode
– control model
– control module
– control operation
– control organ
– control packet
– control panel
– control panel request
– control parameter
– control performance
– control period
– control point setting
– control portion
– control post
– control problem
– control procedure
– control process
– control processor
– control program
– control program file
– control program generation
– control pulse
– control quality
– control range
– control regime
– control register
– control relay
– control response
– control room
– control routine
– control science
– control section
– control sequence
– control signal
– control software
– control specification
– control stability
– control statement
– control station
– control step
– control strategy
– control structure
– control subsystem
– control switch
– control system
– control systems engineering
– control tape
– control terminal
– control test
– control theory
– control time
– control timer
– control transformer
– control unit
– control valve
– control variable
– control vector
– control word
– control-flow chart
См. также в других словарях:
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Distributed key generation — For some protocols no party should be in the sole possession of the secret key. Rather, during distributed key generation every party obtains a share of the key. A threshold of the participating parties need to cooperate in order to achieve a… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… … Wikipedia
Digital Signature Algorithm — The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature… … Wikipedia
Rabin signature algorithm — In cryptography the Rabin Signature Scheme is a method of Digital signature originally proposed by Michael O. Rabin in 1979. The Rabin Signature Scheme was one of the first digital signature schemes proposed, and it was the first to relate the… … Wikipedia
Cayley-Purser algorithm — The Cayley Purser algorithm was a public key cryptography algorithm published in early 1999 by 16 year old Irishwoman Sarah Flannery, based on an unpublished work by Michael Purser, founder of Baltimore Technologies, a Dublin data security… … Wikipedia
Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… … Wikipedia
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
Internet Security Association and Key Management Protocol — ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in an Internet environment. The protocol is defined by RFC 2408. Overview ISAKMP defines the… … Wikipedia