cryptographic jargon

cryptographic jargon
  1. криптографический жаргон

 

криптографический жаргон

[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]

Тематики

  • защита информации

EN

  • cryptographic jargon


Англо-русский словарь нормативно-технической терминологии. . 2015.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "cryptographic jargon" в других словарях:

  • криптографический жаргон — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN cryptographic jargon …   Справочник технического переводчика

  • Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… …   Wikipedia

  • Hash function — A hash function is any well defined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an index into an array. The values returned by a hash function are called hash values, hash… …   Wikipedia

  • ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev …   Wikipedia

  • language — /lang gwij/, n. 1. a body of words and the systems for their use common to a people who are of the same community or nation, the same geographical area, or the same cultural tradition: the two languages of Belgium; a Bantu language; the French… …   Universalium

  • Placeholder name — Placeholder names are words that can refer to objects or people whose names are either temporarily forgotten, irrelevant, or unknown in the context in which they are being discussed. Whatchamacallit (for objects) and Whatshisname or Whatshername… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become …   Wikipedia

  • Les Earnest — Lester Donald Earnest was born in the United States on December 17, 1930. He began his career as a computer programmer in 1954 during a stint as a U.S. Navy Aviation Electronics Officer Digital Computer Project Officer at Naval Air Development… …   Wikipedia

  • Halting State — Infobox Book | name = Halting State image caption = Cover of first edition (hardcover) author = Charles Stross cover artist = country = UK US language = English genre = Science fiction publisher = Orbit (UK), Ace (US) release date = October 2,… …   Wikipedia

  • Contemporary anarchism — Part of the Politics series on Anarchism …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»