- cryptographic tool
- Вычислительная техника: средство криптографической защиты
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Advanced Packaging Tool — Advanced Packaging Tools apt get requesting confirmation before an installation Stable release 0.8.10[1] / November 30, 2010; 11 months ago … Wikipedia
Esteganografía — Saltar a navegación, búsqueda Este artículo trata sobre Transporte de Mensajes Ocultos. Aún requiere correcciones. Para Estenografía, véase Taquigrafía. La esteganografía es la disciplina en la que se estudian y aplican técnicas que permiten el… … Wikipedia Español
Gerolamo Cardano — Infobox Scientist name = Gerolamo Cardano box width = image size =250px caption = Gerolamo Cardano birth date = September 24, 1501 birth place = Pavia death date = September 21 1576 death place = residence = citizenship = nationality = Italian… … Wikipedia
Conjugate coding — is a cryptographic tool, introduced by Stephen Wiesner[1] in the sixties. Because its publication has been surprisingly rejected, it was developed to the world of public key cryptography in the eighties as Oblivious Transfer, first by Rabin and… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
BackupHDDVD — Original author(s) Muslix64 Operating system Windows … Wikipedia
CimTrak — Developer(s) Cimcor Stable release 2.0.6.3 / July 18, 2011; 3 months ago (2011 07 18) Written in C, C++, Visual Basic, LUA … Wikipedia
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
Elliptic curve cryptography — (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… … Wikipedia
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia