keyed MAC on x using key k
- keyed MAC on x using key k
- закодированный MAC (код аутентификации сообщения) по x с использованием ключа k
Англо-русский словарь нормативно-технической терминологии.
academic.ru.
2015.
Смотреть что такое "keyed MAC on x using key k" в других словарях:
закодированный MAC (код аутентификации сообщения) по x с использованием ключа k — (МСЭ Т Н.235.7). [http://www.iks media.ru/glossary/index.html?glossid=2400324] Тематики электросвязь, основные понятия EN keyed MAC on x using key kMAC(k, x) … Справочник технического переводчика
AppleScript — Paradigm(s) Natural language, Scripting … Wikipedia
PostScript fonts — are outline font specifications developed by Adobe Systems for professional digital typesetting, which uses PostScript file format to encode font information. Contents 1 History 2 Technology 3 Font type … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Modular connector — This article is about modular connectors. For the registered jack (RJ) wiring standard, see registered jack. Left to right, modular connectors: 8P8C plug, 6P6C plug, 6P4C plug, 4P4C plug, 6P6C jack … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
HMAC — SHA 1 HMAC Generation. In cryptography, HMAC (Hash based Message Authentication Code) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. As with … Wikipedia
2005–06 NCAA football bowl games — Number of bowl games per state. Season 2005 Regular season September 1–December 3 … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
NCAA football bowl games, 2005–06 — The 2005 06 NCAA college football bowl season was a series of 28 post season games (including the Bowl Championship Series) that was played in December 2005 and January 2006 for Division I A football teams and all stars from Divisions I AA, II,… … Wikipedia