-
1 non-cryptographic
Англо-русский словарь нормативно-технической терминологии > non-cryptographic
-
2 non-linearity criteria for cryptographic functions
критерий нелинейности криптографических функций
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > non-linearity criteria for cryptographic functions
-
3 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system -
4 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
5 device
устройство; прибор; аппарат; средство; элемент; знакintruder alarm (proximity) device — разведывательно-сигнализационный прибор с датчиками неконтактного действия
-
6 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
7 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
8 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
9 machine
1) машина; механизм; устройство || машинный2) вычислительная машина; счётная машина (см. тж calculator, computer)3) редк. процессор•- adding machine
- alphanumeric machine
- alphameric machine
- artificial intelligence machine
- backup machine
- bad machine
- bare machine
- betting machine
- Boltzmann machine
- bookkeeping machine
- bottom-up machine
- bridge machine
- business calculating machine
- business machine
- butterfly machine
- calculating machine
- card-punching machine
- card-punch machine
- card-to-tape machine
- cellular automata machine
- character-oriented machine
- cipher machine
- clerical machine
- clock machine
- code machine
- collating machine
- computer assisted drafting machine
- computing machine
- connection machine
- cryptographic machine
- data flow machine
- data processing machine
- data structure machine
- database machine
- data-driven machine
- determinate machine
- diagnostic machine
- dictating machine
- direct-coupled machines
- document-originating machine
- duplex calculating machine
- electric calculating machine
- electromechanical machine
- electronic accounting machine
- electronic punch-card machine
- finite memory machine
- finite state machine
- friendly machine
- fully redundant machine
- game-playing machine
- game machine
- ganged machine
- good machine
- hardcopy machine
- hardware-realized machine
- inference machine
- information processing machine
- information-logical machine
- information-lossless machine
- key punch machine
- knowledge machine
- knowledgebase machine
- language-specific machine
- learning machine
- Lisp-based machine
- Lisp machine
- logger machine
- logical machine
- logic machine
- long wordlength machine
- Markovian machine
- maze-solving machine
- microprogrammable machine
- MIMD machine
- MS-DOS machine
- multiple-instruction multiple-data stream machine
- multiple-instruction multiple-data machine
- N/C machine
- N-bit machine
- NC machine
- network access machine
- non-numeric machine
- non-speculating machine
- non-Von-Neumann machine
- N-state machine
- numerical control machine
- object machine
- object-based machine
- OS implemented abstract machine
- paged machine
- parallel machine
- physical machine
- playing machine
- plotting machine
- POS machine
- protocol machine
- punched card machine
- punch card machine
- punched-tape machine
- pyramid-vision machine
- reading machine
- reduction machine
- relational algebra machine
- reservation machine
- scalar machine
- scanning machine
- self-organizing machine
- self-replicatind machine
- sequential machine
- sequential-processor machine
- serial machine
- series machine
- SIMD machine
- single-instruction multiple-data stream machine
- single-instruction multiple-data machine
- single-user machine
- sorting machine
- sound machine
- source machine
- speaker recognition machine
- stack machine
- state machine
- statistical machine
- super inference machine
- symbol-manipulatind machine
- tabulating machine
- tagged-token machine
- tag-token machine
- tape-operated machine
- target machine
- teaching machine
- teller machine
- thinking machine
- top-down machine
- transformation machine
- translating machine
- Turing machine
- user machine
- vector machine
- virtual machine
- Von Neumann machineEnglish-Russian dictionary of computer science and programming > machine
-
10 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
11 value
величина; значение (величины) -
12 function
1) функция2) функционировать; находиться в работоспособном состоянии3) выполнять функцию; играть роль4) (дополнительное) функциональное устройство, проф. функция ( в стандарте USB)5) вчт. отображение || отображать•- actuating transfer function
- additive function
- additive/multiplicative function
- admittance function
- advanced communication function
- affine Boolean function
- aggregate function
- algebraic function
- all-pass transfer function
- all-pole function
- all-zero function
- alternating function
- ambiguity function
- amplitude distribution function
- amplitude function
- AM-tive function additive/multiplicative function
- anode work function
- aperture phase function
- apodizing function
- application program function
- autocorrelation function
- automatic azimuth alignment function
- band-limited function
- base station control function
- basis function
- Bellman function
- bent function
- Bessel function of imaginary argument
- Bessel function
- beta function
- bijection function
- bijective function
- binary activation function
- binary sigmoid function
- binate function
- bipolar sigmoid function
- bi-state function
- bivariate distribution function
- Boolean function
- Bose-Einstein distribution function
- bounded function
- boxcar function
- Brillouin function
- built-in function
- Butterworth function
- carpet function
- carrier function
- cathode work function
- characteristic function
- circular function
- closed function
- closed-loop transfer function
- clutching function
- coherence function
- color matching functions
- comb function
- combination function
- combining function
- competitive function
- complementary error function
- complementary function
- composite function
- computable function
- concentrated likelihood function
- continuous function
- contrast transfer function
- control function
- convolution function
- correlation function
- cost function
- covariance generating function
- criterion function
- cross-correlation function - current potential function
- current transfer function
- curried function
- data communications function
- data-path function
- decision function
- degate function
- degating function
- delta function
- demand function
- density function
- descrambling function
- describing function
- difference transfer function
- differentiable function
- digamma function
- Dirac delta function
- Dirac function
- disconnect-reconnect function
- discriminant function
- distribution function
- driving-point function
- eikonal function
- electron wave function
- embedding function
- encryption function
- ergodic function
- error function
- excitation function
- explicit function
- exponential function
- extensional function
- external function
- failure density function
- feedback transfer function
- Fermi function
- Fermi-Dirac distribution function
- force function
- forward transfer function
- frequency function
- frequency-generating function
- frequency-response function
- friend function
- FS function
- full-speed function
- fuzzy function
- fuzzy objective function
- fuzzy utility function
- gage function
- Gaussian function
- Gaussian radial basis function
- generalized function
- generic function
- global implicit function
- global inverse function
- Green functions
- Green's function
- Hamilton function
- Hankel function
- hard limit activation function - hazard function
- head-related transfer function
- Heaviside step function
- Huber function
- hyperbolic function
- hyperbolic tangent activation function
- idempotent function
- image function
- impedance function
- implicit function
- injection function
- injective function
- inline function
- intensional function
- interference function
- interworking function
- inverse distribution function
- inverse function
- invertible mapping function
- inverting function
- kernel function
- Lagrange's function
- Langevin function
- latent function
- Legendre associated function of the first kind
- Legendre associated function of the second kind
- Legendre function of the first kind
- Legendre function of the second kind
- lexical function
- likelihood function
- line search function
- linear function
- linear logic function
- logic function
- logistic function
- logistic sigmoid function
- log-likelihood function
- log-linear function
- log-log function
- look-up function
- loss function
- low-speed function
- LS function
- luminosity function
- macro function
- main function
- maintenance entity function
- majorized function
- majorizing function
- mapping function
- Markov function
- mathematical function
- member function
- membership function
- memo function
- memoised function
- memoized function
- minorized function
- minorizing function
- modified Bessel function
- modular hash-function
- modulating function
- modulation transfer function
- moment-generating function
- monotonic function
- Morse function
- multi-input multi-output transfer function
- multi-valued function
- multivariate distribution function
- mutual coherence function
- natural trigonometric function
- never-decreasing function
- never-increasing function
- non-decreasing function
- non-increasing function
- nonlinear function
- normalized Gaussian radial basis function
- normalized radial basis functions with equal heights
- normalized radial basis functions with equal volumes
- normalized radial basis functions with equal widths and heights
- normalized radial basis functions with equal widths
- normalized radial basis functions with unequal widths and heights
- objective function
- one-one function
- one-to-one function
- one-way function
- one-way hash function
- open-loop transfer function
- optical transfer function
- ordinary Gaussian radial basis function
- ordinary radial basis functions with equal widths
- ordinary radial basis functions with unequal widths
- orthogonal functions
- overlapped functions
- partial autocorrelation function
- penalty function
- perfect hash-function
- phase transfer function
- photoelectric work function
- photopic response function
- piecewise constant function
- piecewise linear function
- piecewise polynomial function
- Pierce function
- point-spread function
- polynomial function
- positive linear function
- postsynaptic potential function
- power function of test
- power function
- predefined function
- predicate function
- probability density function
- probability function
- probability mass function
- production function
- projection function
- projective function
- propagation function
- propositional function
- PSP function
- pulsating function
- pure virtual function
- quadratic error function
- radial basis function
- radial combination function
- ramp function
- range weighting function
- reactance function
- register function
- regression function
- resolvent function
- response function
- restricted function
- risk function
- saturating linear function
- scalar function
- scaling function
- scattering function
- scedastic function
- Schrödinger wave function
- scrambling function
- screen size-viewing distance function
- self-inverse function
- semilinear function
- sensing function
- sentential function
- shape function
- sigmoid activation function
- sigmoid function
- sign function
- signal function
- signum activation function
- signum function
- smooth function
- socket library function
- softmax activation function
- spectral density function
- spectral function
- spectral radiance function
- spline function
- spot function
- spread function
- square-integrable function
- square-law transfer function
- squashed sign function
- squashing function
- state function
- state query function
- steering function
- step function
- stream function
- summing function
- support entity function
- support function
- supported function
- surjection function
- surjective function
- survival function
- switch function
- switching function
- switch-type function
- symmetric saturating linear function
- tame function
- tan-sigmoid activation function
- target function
- tensor function
- tesseral function
- testing function
- tetragamma function
- thermionic work function
- threshold function
- through transfer function
- transcendental function
- transfer function
- trial function
- trigamma function
- trigonometric function
- tri-state function
- typematic function
- unate function
- uncurried function
- unit impulse function
- unit step function
- unsupported function
- user-defined function
- utility function
- vector function
- virtual function
- visibility function
- voltage potential function
- voltage transfer function
- Walsh functions
- wave function
- wave-number limited function
- weighting function
- window function
- work functionThe New English-Russian Dictionary of Radio-electronics > function
-
13 code
-
14 control
1) управление2) контроль, проверкаАнгло-русский словарь по компьютерной безопасности > control
-
15 generator
- pseudorandom sequence generatorАнгло-русский словарь по компьютерной безопасности > generator
-
16 information
информация, сведенияАнгло-русский словарь по компьютерной безопасности > information
-
17 integer
Англо-русский словарь по компьютерной безопасности > integer
-
18 service
служба; сервис, обслуживание; услугиАнгло-русский словарь по компьютерной безопасности > service
-
19 signature
подпись; сигнатура; характерный признакАнгло-русский словарь по компьютерной безопасности > signature
-
20 substitute
1) элемент замены (подстановки)2) (substitution)a). замена, подстановка б). подмена; подлог- digraph substitute- digraphic substituteАнгло-русский словарь по компьютерной безопасности > substitute
- 1
- 2
См. также в других словарях:
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Non-interactive zero-knowledge proof — Non interactive zero knowledge proofs are a variant of zero knowledge proofs. Blum, Feldman, and Micali [1] showed that a common reference string shared between the prover and the verifier is enough to achieve computational zero knowledge without … Wikipedia
Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… … Wikipedia
Cryptographic Service Provider — In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to… … Wikipedia
Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… … Wikipedia
Cryptanalysis of TIA's Common Cryptographic Algorithms — In 1992, the TR 45 working group within the Telecommunications Industry Association (TIA) developed a standard for integration of cryptographic technology into tomorrow s digital cellular systems [TIA92] , which has been updated at least once… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… … Wikipedia
Computational hardness assumption — In cryptography, a major goal is to create cryptographic primitives with provable security. In some cases cryptographic protocols are found to have information theoretic security, the one time pad is a common example. In many cases, information… … Wikipedia