-
1 linear cipher
Англо-русский словарь нормативно-технической терминологии > linear cipher
-
2 linear cipher
Англо-русский словарь по компьютерной безопасности > linear cipher
-
3 cipher
-
4 linear transformations based cipher
шифр на основе линейных преобразований
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > linear transformations based cipher
-
5 linear transformation based cipher
Безопасность: шифр на основе линейных преобразованийУниверсальный англо-русский словарь > linear transformation based cipher
-
6 linear transformation based cipher
Англо-русский словарь по компьютерной безопасности > linear transformation based cipher
-
7 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
8 sequence
2) последовательность (знаков, символов), порядок следования- sequence- finite sequence- finite-length sequence- maximum-length sequence- maximum sequenceАнгло-русский словарь по компьютерной безопасности > sequence
-
9 string
-
10 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system -
11 feedback
Англо-русский словарь по компьютерной безопасности > feedback
-
12 space
1) пространство2) пробел; знак пробела -
13 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
14 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
15 figure
1. n цифра; число2. n количественная информация, количественные данные; цифры3. n разг. арифметика4. n диаграмма, рисунок, чертёж5. n фигура, внешний вид, телосложение; облик, образfigure of speech — фигура речи, риторическая фигура, троп
figure of fun — смешная фигура, предмет насмешек
6. n фигура, персона, личностьhe was one of the greatest figures of his age — он был одним из самых выдающихся людей своего времени
7. n человек; кто-то, нектоI saw figures moving in the dusk — в полутьме я видел какие-то движущиеся фигуры; я видел, что в темноте кто-то ходит
national figure — человек, которого знает вся страна; видный деятель
8. n изображение; портрет; статуя9. n воплощение или предметa figure of fun — предмет всеобщего осмеяния; посмешище
10. n впечатление11. n риторическая фигура, троп12. n разг. цена13. n мат. фигура, тело14. n гороскоп15. v изображать16. v представлять себе17. v амер. разг. считать, полагатьI figure that it will take three years — я считаю, что на это понадобится три года
18. v рассчитывать на19. v полагатьсяI figured on him leaving early — я надеялся, что он рано уйдёт
20. v планировать, собираться21. v играть важную роль22. v фигурировать, участвовать23. v украшать24. v обозначать цифрами25. v разг. считать, подсчитывать; вычислятьfigure up — вычислять; подсчитывать
26. v разг. складывать27. v разг. выполнять фигуры28. v разг. придавать формуСинонимический ряд:1. body (noun) body; build; carriage; chassis; frame; physique; pose; posture; torso2. character (noun) character; person3. design (noun) design; device; motive; pattern; plan4. emblem (noun) emblem; motif; symbol5. form (noun) cast; configuration; conformation; form; format; shape6. number (noun) chiffer; cipher; digit; integer; number; numeral; whole number7. value (noun) amount; cost; price; sum; terms; total; value; worth8. add (verb) add; cast; foot; summate; tally; tot; total; totalize; tote9. appraise (verb) appraise; assess; estimate10. compute (verb) calculate; cast; cipher; compute; count; reckon; sum11. decide (verb) conclude; decide; determine; figure out; resolve; rule; settle12. think (verb) comprehend; master; opine; reason; suppose; thinkАнтонимический ряд:disfigurement; misrepresentation -
16 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
17 analysis
- analysis of observations
- analysis of optical spectrum - activation analysis
- a-posteriori analysis
- approximate analysis
- a-priori analysis
- automatic number analysis
- batch circuit analysis
- behavioral analysis
- binding-time analysis
- bottom-up analysis
- cepstral analysis
- cipher analysis
- circuit analysis
- cluster analysis
- combinatorial analysis
- comparative analysis
- compatibility analysis
- complex analysis
- content analysis
- contingency analysis
- conversational analysis
- cost analysis
- cost/benefit analysis
- covariance analysis
- critical path analysis
- crystal analysis
- cyclic analysis
- dataflow analysis
- decision-tree analysis
- dimensional analysis
- discourse analysis
- discriminant analysis
- display data analysis
- domain analysis
- EDX analysis
- electron diffraction analysis
- electron probe analysis
- empirical analysis
- energy-dispersive X-ray analysis
- error analysis
- factor analysis
- failure analysis - fluorescence analysis
- Fourier analysis
- fractal image analysis
- frequency analysis
- frequency-domain analysis
- frequency-response analysis
- functional analysis
- fuzzy analysis
- fuzzy logic analysis
- harmonic analysis
- incremental circuit analysis
- interactive signal analysis
- interferometric analysis
- interval analysis
- joint analysis
- Kaplan-Meier analysis
- kernel discriminant analysis
- k-means cluster analysis
- large-signal analysis
- laser microprobe analysis
- linear two-group discriminant analysis
- linguistic analysis
- logic analysis
- logistic analysis
- logit analysis
- log-linear analysis
- luminescent analysis
- magnetic neutron diffraction analysis
- malfunction analysis
- mathematical analysis
- matrix analysis
- maximum-likelihood analysis
- means/ends analysis
- memory operating characteristic analysis
- mesh analysis
- meta-analysis
- microprobe analysis
- mixed-level analysis
- mixed-mode analysis
- modified nodal analysis
- Monte-Carlo analysis
- morphological analysis
- multifactor analysis of variance
- multilevel analysis
- multimode analysis
- multiple discriminant analysis
- multivariate analysis
- network analysis
- nodal analysis
- numerical analysis - operation analysis
- path analysis
- phase-plane analysis
- photon analysis
- photothermoelectric analysis
- policy analysis - probabilistic analysis
- problem analysis
- protocol analysis
- qualitative analysis
- quantitative analysis
- radar signal analysis
- radiographic analysis
- radiometric analysis
- randomized block analysis of variance
- receiver operating characteristic analysis
- regression analysis
- regression correlation analysis
- repeated measures analysis of variance
- requirements analysis
- risk analysis
- sampling analysis
- set analysis
- signature analysis
- single-mode analysis
- small-signal analysis
- sound analysis
- sparse table analysis
- spectral analysis
- spectrophotometric analysis
- spectrum signature analysis
- speech analysis
- static analysis
- statistical analysis
- sticky analysis
- structural analysis
- structured analysis
- structured systems analysis
- survival analysis
- syntactic analysis
- syntactical analysis
- system analysis
- system analysis in control
- tensor analysis
- time-domain analysis
- time-to-event analysis
- top-down analysis
- topological analysis
- traffic analysis
- trend analysis
- two-factor factorial analysis of variance
- wave-length dispersive X-ray analysis
- weighted analysis
- what if analysis
- worst-case analysis
- X-ray analysis
- X-ray spectral analysis
- X-ray structure analysis -
18 analysis
- a posteriori analysis
- a priori analysis
- activation analysis
- analysis of covariance
- analysis of means
- analysis of observations
- analysis of optical spectrum
- analysis of variance
- approximate analysis
- automatic number analysis
- batch circuit analysis
- behavioral analysis
- binding-time analysis
- bottom-up analysis
- cepstral analysis
- cipher analysis
- circuit analysis
- cluster analysis
- combinatorial analysis
- comparative analysis
- compatibility analysis
- complex analysis
- content analysis
- contingency analysis
- conversational analysis
- cost analysis
- cost/benefit analysis
- covariance analysis
- critical path analysis
- crystal analysis
- cyclic analysis
- dataflow analysis
- decision-tree analysis
- dimensional analysis
- discourse analysis
- discriminant analysis
- display data analysis
- domain analysis
- EDX analysis
- electron diffraction analysis
- electron probe analysis
- empirical analysis
- energy-dispersive X-ray analysis
- error analysis
- factor analysis
- failure analysis
- failure mode and effects analysis
- fault-tree analysis
- feature analysis
- finite element analysis
- flow analysis
- fluorescence analysis
- Fourier analysis
- fractal image analysis
- frequency analysis
- frequency-domain analysis
- frequency-response analysis
- functional analysis
- fuzzy analysis
- fuzzy logic analysis
- harmonic analysis
- incremental circuit analysis
- interactive signal analysis
- interferometric analysis
- interval analysis
- joint analysis
- Kaplan-Meier analysis
- kernel discriminant analysis
- k-means cluster analysis
- large-signal analysis
- laser microprobe analysis
- linear two-group discriminant analysis
- linguistic analysis
- logic analysis
- logistic analysis
- logit analysis
- log-linear analysis
- luminescent analysis
- magnetic neutron diffraction analysis
- malfunction analysis
- mathematical analysis
- matrix analysis
- maximum-likelihood analysis
- means/ends analysis
- memory operating characteristic analysis
- mesh analysis
- meta-analysis
- microprobe analysis
- mixed-level analysis
- mixed-mode analysis
- modified nodal analysis
- Monte-Carlo analysis
- morphological analysis
- multifactor analysis of variance
- multilevel analysis
- multimode analysis
- multiple discriminant analysis
- multivariate analysis
- network analysis
- nodal analysis
- numerical analysis
- object-oriented analysis
- off-line circuit analysis
- operation analysis
- path analysis
- phase-plane analysis
- photon analysis
- photothermoelectric analysis
- policy analysis
- predictable failure analysis
- principal components analysis
- probabilistic analysis
- problem analysis
- protocol analysis
- qualitative analysis
- quantitative analysis
- radar signal analysis
- radiographic analysis
- radiometric analysis
- randomized block analysis of variance
- receiver operating characteristic analysis
- regression analysis
- regression correlation analysis
- repeated measures analysis of variance
- requirements analysis
- risk analysis
- sampling analysis
- set analysis
- signature analysis
- single-mode analysis
- small-signal analysis
- sound analysis
- sparse table analysis
- spectral analysis
- spectrophotometric analysis
- spectrum signature analysis
- speech analysis
- static analysis
- statistical analysis
- sticky analysis
- structural analysis
- structured analysis
- structured systems analysis
- survival analysis
- syntactic analysis
- syntactical analysis
- system analysis in control
- system analysis
- tensor analysis
- time-domain analysis
- time-to-event analysis
- top-down analysis
- topological analysis
- traffic analysis
- trend analysis
- two-factor factorial analysis of variance
- wave-length dispersive X-ray analysis
- weighted analysis
- what if analysis
- worst-case analysis
- X-ray analysis
- X-ray spectral analysis
- X-ray structure analysisThe New English-Russian Dictionary of Radio-electronics > analysis
-
19 analysis
анализ; изучение; криптоанализАнгло-русский словарь по компьютерной безопасности > analysis
-
20 complexity
Англо-русский словарь по компьютерной безопасности > complexity
- 1
- 2
См. также в других словарях:
Linear cryptanalysis — In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher. Attacks have been developed for block ciphers and stream ciphers. Linear cryptanalysis is one of the two… … Wikipedia
Cipher security summary — This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity … Wikipedia
Linear congruential generator — A linear congruential generator (LCG) represent one of the oldest and best known pseudorandom number generator algorithms. [ [http://demonstrations.wolfram.com/LinearCongruentialGenerators/ Linear Congruential Generators] by Joe Bolte, The… … Wikipedia
Linear feedback shift register — [ xor gate provides feedback to the register that shifts bits from left to right. The maximal sequence consists of every possible state except the 0000 state.] A linear feedback shift register (LFSR) is a shift register whose input bit is a… … Wikipedia
Stream cipher — The operation of the keystream generator in A5/1, a LFSR based stream cipher used to encrypt mobile phone conversations. In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher… … Wikipedia
Hill cipher — Hill s cipher machine, from figure 4 of the patent In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Differential-linear attack — Introduced by Martin Hellman and Susan K. Langford in 1994, the differential linear attack is a mix of both linear cryptanalysis and differential cryptanalysis. The attack utilises a differential characteristic over part of the cipher with a… … Wikipedia
Grain (cipher) — Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware … Wikipedia
Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… … Wikipedia
Camellia (cipher) — Infobox block cipher name = Camellia caption = designers = Mitsubishi, NTT publish date = 2000 derived from = E2, MISTY1 derived to = related to = certification = CRYPTREC, NESSIE key size = 128, 192 or 256 bits block size = 128 bits structure =… … Wikipedia