keyed MAC on x using key k

keyed MAC on x using key k
  1. закодированный MAC (код аутентификации сообщения) по x с использованием ключа k

 

закодированный MAC (код аутентификации сообщения) по x с использованием ключа k
(МСЭ-Т Н.235.7).
[http://www.iks-media.ru/glossary/index.html?glossid=2400324]

Тематики

  • электросвязь, основные понятия

EN

  • keyed MAC on x using key k
  • MAC(k, x)


Англо-русский словарь нормативно-технической терминологии. . 2015.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "keyed MAC on x using key k" в других словарях:

  • закодированный MAC (код аутентификации сообщения) по x с использованием ключа k — (МСЭ Т Н.235.7). [http://www.iks media.ru/glossary/index.html?glossid=2400324] Тематики электросвязь, основные понятия EN keyed MAC on x using key kMAC(k, x) …   Справочник технического переводчика

  • AppleScript — Paradigm(s) Natural language, Scripting …   Wikipedia

  • PostScript fonts — are outline font specifications developed by Adobe Systems for professional digital typesetting, which uses PostScript file format to encode font information. Contents 1 History 2 Technology 3 Font type …   Wikipedia

  • Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… …   Wikipedia

  • Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… …   Wikipedia

  • Modular connector — This article is about modular connectors. For the registered jack (RJ) wiring standard, see registered jack. Left to right, modular connectors: 8P8C plug, 6P6C plug, 6P4C plug, 4P4C plug, 6P6C jack …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • HMAC — SHA 1 HMAC Generation. In cryptography, HMAC (Hash based Message Authentication Code) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. As with …   Wikipedia

  • 2005–06 NCAA football bowl games — Number of bowl games per state. Season 2005 Regular season September 1–December 3 …   Wikipedia

  • Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… …   Wikipedia

  • NCAA football bowl games, 2005–06 — The 2005 06 NCAA college football bowl season was a series of 28 post season games (including the Bowl Championship Series) that was played in December 2005 and January 2006 for Division I A football teams and all stars from Divisions I AA, II,… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»