-
1 withstand cryptanalysis
Англо-русский словарь нормативно-технической терминологии > withstand cryptanalysis
-
2 withstand cryptanalysis
Англо-русский словарь по компьютерной безопасности > withstand cryptanalysis
-
3 withstand cryptanalysis
противостоять криптоанализуEnglish-Russian cryptological dictionary > withstand cryptanalysis
-
4 cryptanalysis
криптоанализ; конкретное применение криптоанализа; анализ зашифрованного текста, дешифрованиеАнгло-русский словарь по компьютерной безопасности > cryptanalysis
-
5 противостоять криптоанализу
Русско-английский словарь нормативно-технической терминологии > противостоять криптоанализу
См. также в других словарях:
противостоять криптоанализу — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=5138] Тематики защита информации EN withstand cryptanalysis … Справочник технического переводчика
Ciphertext — The Zimmermann Telegram (as it was sent from Washington to Mexico) encrypted as ciphertext. This article is about encrypted information. For an overview of cryptographic technology in general, see Cryptography. In cryptography, ciphertext (or… … Wikipedia
A5/1 — is a stream cipher used to provide over the air communication privacy in the GSM cellular telephone standard. It was initially kept secret, but became public knowledge through leaks and reverse engineering. A number of serious weaknesses in the… … Wikipedia
Classical cipher — A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… … Wikipedia
Cryptographically secure pseudorandom number generator — A cryptographically secure pseudo random number generator (CSPRNG) is a pseudo random number generator (PRNG) with properties that make it suitable for use in cryptography. Many aspects of cryptography require random numbers, for example: Key… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
FORK-256 — is a proposed hash algorithm to withstand security holes that were found in SHA 1 and MD5. The algorithm was designed to be more secure and also faster than SHA 256. FORK 256 uses 512 bit blocks and implements preset constants that change after… … Wikipedia
international relations — a branch of political science dealing with the relations between nations. [1970 75] * * * Study of the relations of states with each other and with international organizations and certain subnational entities (e.g., bureaucracies and political… … Universalium
List of Fringe characters — This is a list of characters in the science fiction television series Fringe. Contents 1 Primary characters 2 Secondary characters 3 Recurring characters 3.1 … Wikipedia
crypt (Unix) — In Unix computing, crypt is the name of both a utility program and a C programming function. Though both are used for encrypting data, they are otherwise essentially unrelated. To distinguish between the two, writers often refer to the utility… … Wikipedia