-
1 public key cryptosystem
kryptosystem klucza jawnegokryptosystem klucza publicznegoEnglish-Polish dictionary for engineers > public key cryptosystem
-
2 public key cryptosystem
kryptosystem klucza jawnegokryptosystem klucza publicznegoEnglish-Polish dictionary of Electronics and Computer Science > public key cryptosystem
См. также в других словарях:
Key management — is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.In cryptography, key management includes all of the provisions made in a… … Wikipedia
Key system — can refer to the following:*Key telephone system communication *Key System Defunct transportation system in the San Francisco Bay Area *KeY System a software verification tool. *Cryptosystem using a Cryptographic key … Wikipedia
Key escrow — (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may… … Wikipedia
Cryptosystem — There are two different meanings of the word cryptosystem. One is used by the cryptographic community, while the other is the meaning understood by the public. General meaning In this meaning, the term cryptosystem is used as shorthand for… … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Key distribution center — In cryptography, a key distribution center (KDC) is part of a cryptosystem intended to reduce the risks inherent in exchanging keys. KDCs often operate in systems within which some users may have permission to use certain services at some times… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… … Wikipedia
Hybrid cryptosystem — In cryptography, public key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely (among other useful properties). However, they often rely on complicated… … Wikipedia
Cramer–Shoup cryptosystem — The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the… … Wikipedia
Naccache–Stern cryptosystem — Note: this is not to be confused with the Naccache–Stern knapsack cryptosystem. The Naccache–Stern cryptosystem is a homomorphic public key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was… … Wikipedia