-
1 link cryptography
-
2 link cryptography
криптография с канально-ориентированным (c канальным) шифрованиемАнгло-русский словарь по компьютерной безопасности > link cryptography
-
3 cryptography
1) криптография; криптографическая защита, криптографическое закрытие информации- computational cryptography- computational complexity based cryptographyАнгло-русский словарь по компьютерной безопасности > cryptography
-
4 криптография с канально-ориентированным шифрованием
Security: link cryptographyУниверсальный русско-английский словарь > криптография с канально-ориентированным шифрованием
-
5 криптография с канальным шифрованием
Security: link cryptographyУниверсальный русско-английский словарь > криптография с канальным шифрованием
См. также в других словарях:
Link encryption — is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teleprinter circuit or the line between two network switches). It contrasts with end to end encryption where messages… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… … Wikipedia
Neural cryptography — is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially neural network algorithms, for use in encryption and cryptanalysis. Contents 1 Definition 2 Applications 3 Neural key e … Wikipedia
Export of cryptography in the United States — The export of cryptography in the United States is the transfer from the United States to another country of devices and technology related to cryptography. Since World War II, many governments, including the U.S. and its NATO allies, have… … Wikipedia
NSA cryptography — The vast majority of the National Security Agency s work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized… … Wikipedia
Transient-key cryptography — is a form of public key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to individuals or organizations. In a transient key system, private keys are used briefly and then destroyed, which is why it… … Wikipedia
One-way voice link — A one way voice link (OWVL) is a shortwave radio communication method used by spy networks to communicate with agents in the field. This system often employs recorders to transmit pre recorded messages in real time or in burst transmissions,… … Wikipedia
Permissive Action Link — Eine externe PAL Kontrolleinheit. Sie kostete ursprünglich 290.000 US Dollar, bevor die Stückkosten schließlich signifikant reduziert werden konnten[1] Permissive Action Link (PAL) ist die Bezeichnung einer US amerikanischen… … Deutsch Wikipedia
Prescribed Action Link — Eine externe PAL Kontrolleinheit. Sie kostete ursprünglich 290.000 US Dollar, bevor die Stückkosten schließlich signifikant reduziert werden konnten[1] Permissive Action Link (PAL) ist die Bezeichnung einer US amerikanischen… … Deutsch Wikipedia