-
1 product of two ciphers
Англо-русский словарь нормативно-технической терминологии > product of two ciphers
-
2 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher
- meta-cipher
- mixing cipher
- monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key -cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher
- stream-generator cipher
- stream meta-cipher
- strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipher -
3 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher - monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key-cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher - strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipherThe New English-Russian Dictionary of Radio-electronics > cipher
См. также в других словарях:
произведение двух шифров — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN product of two ciphers … Справочник технического переводчика
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
computer — computerlike, adj. /keuhm pyooh teuhr/, n. 1. Also called processor. an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations. Cf. analog… … Universalium
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia
NOEKEON — General Designers Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen First published 2000 09 Derived from 3 Way, BaseKing Cipher detail Key sizes … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Large numbers — This article is about large numbers in the sense of numbers that are significantly larger than those ordinarily used in everyday life, for instance in simple counting or in monetary transactions. The term typically refers to large positive… … Wikipedia
RSA — In cryptography, RSA is an algorithm for public key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic… … Wikipedia
Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… … Wikipedia
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia