-
1 transient key
Англо-русский словарь по компьютерной безопасности > transient key
-
2 transient key
промежуточный ключ. -
3 transient-key cryptography
Англо-русский словарь нормативно-технической терминологии > transient-key cryptography
-
4 transient-key cryptography
Безопасность: криптография с изменяемым (для каждого сообщения) ключомУниверсальный англо-русский словарь > transient-key cryptography
-
5 transient-key cryptosystem
Универсальный англо-русский словарь > transient-key cryptosystem
-
6 transient key cryptography
Англо-русский словарь по компьютерной безопасности > transient key cryptography
-
7 transient key (crypto)system
Англо-русский словарь по компьютерной безопасности > transient key (crypto)system
-
8 transient key (crypto)system
Англо-русский словарь по компьютерной безопасности > transient key (crypto)system
-
9 transient key cryptosystem
Англо-русский словарь по компьютерной безопасности > transient key cryptosystem
-
10 transient key system
Англо-русский словарь по компьютерной безопасности > transient key system
-
11 transient-key cryptography
криптография с переменным ключомEnglish-Russian cryptological dictionary > transient-key cryptography
-
12 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
13 transient size
-
14 криптография с переменным ключом
Русско-английский словарь нормативно-технической терминологии > криптография с переменным ключом
-
15 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
16 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
17 cryptography
1) криптография; криптографическая защита, криптографическое закрытие информации- computational cryptography- computational complexity based cryptographyАнгло-русский словарь по компьютерной безопасности > cryptography
-
18 криптография с изменяемым (для каждого сообщения) ключом
Security: transient-key cryptographyУниверсальный русско-английский словарь > криптография с изменяемым (для каждого сообщения) ключом
-
19 криптосистема с изменяемым (для каждого сообщения) ключом
Security: transient-key cryptosystemУниверсальный русско-английский словарь > криптосистема с изменяемым (для каждого сообщения) ключом
-
20 криптография с изменяемым ключом
Security: (для каждого сообщения) transient-key cryptographyУниверсальный русско-английский словарь > криптография с изменяемым ключом
См. также в других словарях:
Transient-key cryptography — is a form of public key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to individuals or organizations. In a transient key system, private keys are used briefly and then destroyed, which is why it… … Wikipedia
Temporal Key Integrity Protocol — or TKIP is a security protocol used in the IEEE 802.11 wireless networks. Background TKIP (pronounced tee kip ) was designed by the IEEE 802.11i task group and the Wi Fi Alliance as a solution to replace WEP without requiring the replacement of… … Wikipedia
Adobe Transient Witticisms — is the name coined for an Easter egg appearing in several versions of Adobe Photoshop. The easter egg can be viewed by accessing the alternate splash screen (in Mac OS this involves holding down the command key while choosing About Photoshop in… … Wikipedia
Naval Air Station Key West — Coordinates: 24°34′33″N 081°41′20″W / 24.57583°N 81.68889°W / 24.57583; 81.68889 … Wikipedia
Elliott Key — is the northernmost of the true Florida Keys (those keys which are ancient coral reefs lifted above the present sea level), and the largest key north of Key Largo. It is located entirely within Biscayne National Park, in Miami Dade County,… … Wikipedia
Boca Chica Key — is an island in the lower Florida Keys approximately 3 miles east of the island of Key West. U.S. 1 (or the Overseas Highway) crosses the key at approximately mile markers 6.5 8, east of Key West.Its name is Spanish for small mouth , (not girl… … Wikipedia
High Energy Transient Explorer — (abrégé en HETE ; appelé également Explorer 79) est un satellite astronomique américain avec une participation internationale (principalement japonaise et française). L objectif principal de HETE est de réaliser la première étude… … Wikipédia en Français
IEEE 802.11i-2004 — IEEE 802.11i 2004, or 802.11i, is an amendment to the IEEE 802.11 standard specifying security mechanisms for wireless networks. The amendment has been incorporated into the published IEEE 802.11 2007 standard.802.11 is a set of IEEE standards… … Wikipedia
ANSI ASC X9.95 Standard — The ANS X9.95 standard for trusted timestamps expands on the widely used [http://tools.ietf.org/html/rfc3161 RFC 3161 Internet X.509 Public Key Infrastructure Time Stamp Protocol] by adding data level security requirements that can ensure data… … Wikipedia
Trusted timestamping — is the process of securely keeping track of the creation and modification time of a document. Security here means that no one not even the owner of the document should be able to change it once it has been recorded provided that the timestamper s … Wikipedia
Wi-Fi Protected Access — (WPA et WPA2) est un mécanisme pour sécuriser les réseaux sans fil de type Wi Fi. Il a été créé en réponse aux nombreuses et sévères faiblesses que des chercheurs ont trouvées dans le mécanisme précédent, le WEP. WPA respecte la majorité de la… … Wikipédia en Français