- Rivest, Shamir and Adleman's algorithm
- Безопасность: алгоритм криптосистемы RSA, алгоритм криптосистемы Ривеста, Шамира и Адлемана
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Rivest Shamir Adleman — Adi Shamir, un des auteurs de RSA. Rivest Shamir Adleman (presque toujours abrégé en RSA) est un algorithme de cryptographie asymétrique, très utilisé dans le commerce électronique, et plus généralement pour échanger des données confidentielles… … Wikipédia en Français
Ron Rivest — Infobox Scientist name = Ronald L. Rivest caption = birth date = 1947 birth place = Schenectady, New York death date = death place = ethnicity = residence = United States nationality American field = Cryptography work institution = Massachusetts… … Wikipedia
Leonard Adleman — Infobox Scientist name = Leonard Max Adleman image width = 200px caption = birth date = birth date and age|1945|12|31 birth place = flagicon|United States California death date = death place = residence = citizenship = nationality = ethnicity =… … Wikipedia
Adi Shamir — Infobox Scientist name = Adi Shamir image width = 200px caption = At the CRYPTO 2003 conference birth date = 1952 birth place = Tel Aviv, Israel death date = death place = residence = Israel citizenship = nationality = ethnicity = field =… … Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia
RSA — In cryptography, RSA is an algorithm for public key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic… … Wikipedia
Clifford Cocks — Born 28 December 1950 Prestbury, Cheshire, United Kingdom Nationality British Fields … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Division (digital) — Several algorithms exist to perform division in digital designs. These algorithms fall into two main categories: slow division and fast division. Slow division algorithms produce one digit of the final quotient per iteration. Examples of slow… … Wikipedia
Хандшух, Хелен — Хелен Хандшух (англ. Helena Handschuh) криптограф. Наиболее известная разработка симметричный блочный криптоалгоритм SHACAL. Помимо этого принимала участие в создании блочного шифра Universal Encryption Standard. С 2009 года… … Википедия
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia