-
1 key generation function
функция генерации [порождения] ключаEnglish-Russian cryptological dictionary > key generation function
-
2 key creation function
English-Russian cryptological dictionary > key creation function
-
3 функция генерирования ключа
Security: key creation function, key generation functionУниверсальный русско-английский словарь > функция генерирования ключа
-
4 символ
1. cipher2. token3. emblem4. digit5. icon6. letter7. sign8. symbolic unit9. badge10. char11. character12. symbolsсимвол входа; имя входа — entry symbol
13. trappings14. symbol
См. также в других словарях:
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Distributed key generation — For some protocols no party should be in the sole possession of the secret key. Rather, during distributed key generation every party obtains a share of the key. A threshold of the participating parties need to cooperate in order to achieve a… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key punch — A key punch is a device for entering data into punched cards by precisely punching holes at locations designated by the keys struck by the operator. Early keypunches were manual devices. Later keypunches were mechanized, often resembled a small… … Wikipedia
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
Demand generation — is the focus of targeted marketing programs to drive awareness and interest in a company s products and/or services. Commonly used in business to business, business to government, or longer sales cycle business to consumer sales cycles, demand… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Monitoring and Measurement in the Next Generation Technologies — (MOMENT) is a project aimed at integrating different platforms for network monitoring and measurement to develop a common and open pan European infrastructure. The system will include both passive and active monitoring and measurement techniques… … Wikipedia
Chroma key — For the progressive rock band, see Chroma Key. For musical tonality depending on key, see Key coloration. Bluescreen and Green screen redirect here. For other uses, see Blue screen and Green screen (disambiguation), respectively. Today s… … Wikipedia
Origin and function of meiosis — Eukaryotes are organisms with a true nucleus in which the DNA genome is enclosed in a double membrane (e.g. fungi, protozoans, vertebrates, higher plants), in contrast to prokaryotes (bacteria and blue green algae) that lack a nuclear membrane.… … Wikipedia
S/KEY — is a one time password system developed for authentication to Unix like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long term password. A user s real password is combined in … Wikipedia