- online cryptanalysis
- линейный криптоанализ, криптоанализ в реальном (масштабе) времени
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Cryptanalysis of the Lorenz cipher — The Lorenz SZ machines had 12 wheels each with a different number of cams (or pins). Wheel number 1 2 3 4 5 6 7 … Wikipedia
Microsystems Software, Inc. v. Scandinavia Online AB — is a 2000 US District Court civil case, numbered 00 cv10488 EFH, in the United States District Court for the District of Massachusetts. It received considerable attention in the online community because it involved reverse engineering and… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev … Wikipedia
Books on cryptography — have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages mdash; see Kerckhoffs principle. In… … Wikipedia
Bletchley Park — Infobox Museum name = Bletchley Park imagesize = 200 caption = During World War II, codebreakers at Bletchley Park decrypted and interpreted messages from a large number of Axis code and cipher systems, including the German Enigma machine. For… … Wikipedia
SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms … Wikipedia
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia