multiple-access cryptosystem

multiple-access cryptosystem
Безопасность: асимметричная криптосистема, двухключевая криптосистема, криптосистема множественного доступа, криптосистема с открытым ключом

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем написать реферат

Смотреть что такое "multiple-access cryptosystem" в других словарях:

  • Access structure — Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that are granted access are called qualified. In set theoretic terms they are referred to as qualified …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit …   Wikipedia

  • Intelligence cycle management — This article is at the top level of a series of articles about Intelligence Cycle Management.Within the context of government, military and business affairs, intelligence (the gathering and analysis of accurate, reliable information) is intended… …   Wikipedia

  • Power analysis — For power analysis in statistics, see Statistical power. A diagram of differential power analysis …   Wikipedia

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Plaintext — This article is about cryptography. For the computing term meaning the storage of textual material that is (largely) unformatted, see plain text. In cryptography, plaintext is information a sender wishes to transmit to a receiver. Cleartext is… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»