-
1 key-controlled algorithm
- алгоритм (шифрования), управляемый ключом
алгоритм (шифрования), управляемый ключом
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > key-controlled algorithm
-
2 key-controlled algorithm
Универсальный англо-русский словарь > key-controlled algorithm
-
3 key-controlled algorithm
алгоритм (шифрования), управляемый ключом (зависящий от ключа)Англо-русский словарь по компьютерной безопасности > key-controlled algorithm
-
4 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
5 PCA
1) Компьютерная техника: Probabilistic Cellular Automata, printed circuit antenna2) Медицина: Patient Control Analgesia, posterior cricoarytenoid3) Американизм: Per Capita Apportionment4) Военный термин: Pacific Communications Area, Penetrator Core Ammunition, Personal Combat Armor, Powered Combat Armor, permanent change of assignment, personal cash allowance, point of closest approach, positive control area, positive controlled airspace, potentially contaminated area, principal component analysis, principal control authority, program change analysis, program checkout facility5) Техника: pool critical assembly, primary control assembly, primary coolant activity, Physical Configuration Audit, предварительно кондиционированный воздух (Pre-Conditioned Air)6) Химия: Pyrrolidone Carboxylic Acid7) Строительство: Portland Cement Association8) Железнодорожный термин: Consolidated Rail Corporation9) Юридический термин: Постоянный арбитражный суд10) Бухгалтерия: Priority Collection Action11) Дипломатический термин: СПС (Partnership and Cooperation Agreement - Соглашение о партнерстве и сотрудничестве)12) Сокращение: Parachute Club of America, Permanent Court of Arbitration, Progressive Citizens of America, Propulsion-Controlled Aircraft, Personal Care Assistant, public key algorithm13) Физиология: Patient Controlled Analgesia, Patient Controlled Anesthesia, Post Conceptual Age, Prostate Cancer Archive14) Шахматы: Professional Chess Association15) Электроника: Printed Circuit Assembly, Processor Controlled Amplitude16) Вычислительная техника: Printed Circuit Assemblies, Power Calibration Area (CD), Policy Certification Authority (DFN, PGP)17) Микробиология: Plate Count Agar18) Иммунология: Peptide competition assay, пептидный конкурентный анализ, passive cutaneous anaphylaxis19) Транспорт: Positive Control Airspace20) Парфюмерия: pyrrolidone carbonic acid21) Фирменный знак: Phone Card Of America22) Экология: polar cap absorption23) Энергетика: probabilistic congestion analysis, вероятностные расчёты потока распределения с учётом ограничений24) ЕБРР: partnership and cooperation agreement25) Программирование: Programmable Counter Array, аудит физической конфигурации (см. physical configuration audit)26) Макаров: анализ главных компонент27) Инженерные войска: Precipitation with Compressed Anti-solvent осаждение при помощи сжатого антирастворителя28) Молекулярная биология: protein-fragment complementation assay29) Должность: Personal Care Aide, Personal Care Associate, Personal Care Attendant, Physician Care Assistant30) Аэропорты: Portage Creek, Alaska USA31) НАСА: Pitch Change Axis
См. также в других словарях:
Algorithm — Flow chart of an algorithm (Euclid s algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≤ A yields yes… … Wikipedia
Controlled Cryptographic Item — A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… … Wikipedia
Chroma key — For the progressive rock band, see Chroma Key. For musical tonality depending on key, see Key coloration. Bluescreen and Green screen redirect here. For other uses, see Blue screen and Green screen (disambiguation), respectively. Today s… … Wikipedia
Shor's algorithm — Shor s algorithm, first introduced by mathematician Peter Shor, is a quantum algorithm for integer factorization. On a quantum computer, to factor an integer N, Shor s algorithm takes polynomial time in log{N}, specifically O((log{N})^3),… … Wikipedia
алгоритм (шифрования), управляемый ключом — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN key controlled algorithm … Справочник технического переводчика
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
NSA cryptography — The vast majority of the National Security Agency s work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia