-
1 secure cryptosystem
Безопасность: нераскрываемая криптосистема -
2 secure cryptosystem
English-Russian electronics dictionary > secure cryptosystem
-
3 secure cryptosystem
The New English-Russian Dictionary of Radio-electronics > secure cryptosystem
-
4 secure cryptosystem
криптостойкая (невскрываемая) криптосистемакриптостойкая (невскрываемая) криптосистемаАнгло-русский словарь по компьютерной безопасности > secure cryptosystem
-
5 unconditionally secure cryptosystem
безусловно стойкая криптосистема
Стойкость безусловно стойкой криптосистемы, не зависит ни от вычислительной мощности, ни от времени, которыми может располагать противник.
[ http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4935]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > unconditionally secure cryptosystem
-
6 computationally secure cryptosystem
Универсальный англо-русский словарь > computationally secure cryptosystem
-
7 provable secure cryptosystem
Безопасность: криптосистема с доказуемой криптостойкостьюУниверсальный англо-русский словарь > provable secure cryptosystem
-
8 computationally secure cryptosystem
вычислительно-безопасная (вычислительно-стойкая) криптосистемавычислительно-безопасная (вычислительно-стойкая) криптосистемаАнгло-русский словарь по компьютерной безопасности > computationally secure cryptosystem
-
9 provable secure cryptosystem
Англо-русский словарь по компьютерной безопасности > provable secure cryptosystem
-
10 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
11 cryptosystem
криптографическая система, криптосистема- Merkle-Hellman cryptosystem
- M.I.T. public-key cryptosystem
- public key cryptosystem
- Rivest-Shamir-Adleman cryptosystem
- secure cryptosystem
- symmetric cryptosystem
- trapdoor knapsack cryptosystem
- virtual key cryptosystem -
12 cryptosystem
криптографическая система, криптосистема- M.I.T. public-key cryptosystem
- Merkle-Hellman cryptosystem
- public key cryptosystem
- Rivest-Shamir-Adleman cryptosystem
- secure cryptosystem
- symmetric cryptosystem
- trapdoor knapsack cryptosystem
- virtual key cryptosystemThe New English-Russian Dictionary of Radio-electronics > cryptosystem
-
13 cryptography
= crypto(от греч. cryptos - тайный) искусство, наука и технология обеспечения секретности важной информации, её защиты от изменений и неавторизованного доступа при передаче по каналам связи и/или хранении; широко использует математические методы, связанные с большими объёмами вычислений (computationally intensive). История криптографии делится на два периода - донаучный (prescientific) и период научной криптографии, начавшийся в 1949 г. с выхода статьи К. Шеннона (С. Е. Shannon) "Communication Theory of Secrecy Systems". В криптографии предполагается, что противник может перехватить зашифрованное сообщение, но без знания ключа, даже если сам способ шифрования известен, не может прочитать это сообщение в течение времени, определяемом криптографической стойкостью шифра (cryptographic strength).One of the first steps in building a secure embedded system is to see if cryptography is actually needed. — Один из первых шагов в построении безопасной встроенной системы заключается в том, чтобы решить, действительно ли необходима для неё криптография
Ant:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > cryptography
См. также в других словарях:
Cryptosystem — There are two different meanings of the word cryptosystem. One is used by the cryptographic community, while the other is the meaning understood by the public. General meaning In this meaning, the term cryptosystem is used as shorthand for… … Wikipedia
Blum-Goldwasser cryptosystem — The Blum Goldwasser (BG) cryptosystem is an asymmetric key encryption algorithm proposed by Manuel Blum and Shafi Goldwasser in 1984. Blum Goldwasser is a probabilistic, semantically secure cryptosystem with a constant size ciphertext expansion.… … Wikipedia
Goldwasser-Micali cryptosystem — The Goldwasser Micali cryptosystem (GM) is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction of being the first probabilistic public key encryption scheme which is provably… … Wikipedia
Paillier cryptosystem — The Paillier cryptosystem, named after and invented by Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n th residue classes is believed to be computationally difficult. This… … Wikipedia
Hybrid cryptosystem — In cryptography, public key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely (among other useful properties). However, they often rely on complicated… … Wikipedia
Cramer–Shoup cryptosystem — The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the… … Wikipedia
Rabin cryptosystem — The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization. However the Rabin cryptosystem has the advantage that the problem on which it relies has been proved … Wikipedia
Cramer-Shoup cryptosystem — The Cramer Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the… … Wikipedia
McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… … Wikipedia
Naccache–Stern knapsack cryptosystem — Note: this is not to be confused with the Naccache–Stern cryptosystem based on the higher residuosity problem. The Naccache–Stern Knapsack Cryptosystem is an atypical public key cryptosystem developed by David Naccache and Jacques Stern in 1997.… … Wikipedia
Threshold cryptosystem — In cryptography, a cryptosystem is called a threshold cryptosystem , if in order to decrypt an encrypted message a number of parties exceeding a threshold is required to cooperate in the decryption protocol. The message is encrypted using a… … Wikipedia