cryptology-based

cryptology-based
Телекоммуникации: на основе криптологии (например, система безопасности, основанная на методах криптологии)

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Нужно решить контрольную?

Смотреть что такое "cryptology-based" в других словарях:

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

  • Cryptology Research Society of India — The logo of CRSI. Cryptology Research Society of India (CRSI) is a non profit scientific organization that supports research in cryptography and security related fields in India …   Wikipedia

  • Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… …   Wikipedia

  • Lattice based cryptography — is the generic term for asymmetric cryptographic primitives based on lattice. HistoryLattice have first been discovered by mathematicans Lagrange and Gauss. Lattice have been used laterly in computer algorithms and in cryptanalysis. In 1996 Atjai …   Wikipedia

  • ID-based cryptography — Identity based cryptography is a type of public key cryptography in which a publicly known string representing an individual or organization is used as a public key. The public string could include an email address, domain name, or a physical IP… …   Wikipedia

  • Grill (cryptology) — The grill ( pl. ruszt), in cryptology, was a method used, chiefly early on, by the mathematician cryptologists of the Polish Cipher Bureau in decrypting German Enigma machine ciphers.The grill method was described by Marian Rejewski as being… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Digital credential — Digital credentials are the digital equivalent of paper based credentials. Just as a paper based credential could be a passport, a Driver s license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket… …   Wikipedia

  • Marian Rejewski — (probably 1932, the year he first solved the Enigma machine). Courtesy of Janina Sylwestrzak, Rejewski s daughter. Born Marian Adam Rejewski August 16, 1905(1905 0 …   Wikipedia

  • Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …   Wikipedia

  • Elliptic curve cryptography — (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»