- threshold (crypto)system
- криптосистема с разделением ключей (на основе пороговой схемы)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia
Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… … Wikipedia
WOMAN — This article is arranged according to the following outline: the historical perspective biblical period marriage and children women in household life economic roles educational and managerial roles religious roles women outside the household… … Encyclopedia of Judaism
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
United Kingdom — a kingdom in NW Europe, consisting of Great Britain and Northern Ireland: formerly comprising Great Britain and Ireland 1801 1922. 58,610,182; 94,242 sq. mi. (244,100 sq. km). Cap.: London. Abbr.: U.K. Official name, United Kingdom of Great… … Universalium
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
ALIYAH AND ABSORPTION — GENERAL SURVEY Introduction Aliyah, ascension or going up, is the coming of Jews as individuals or in groups, from exile or diaspora to live in the Land of Israel. Those who go up for this purpose are known as olim – a term used in the Bible for… … Encyclopedia of Judaism
Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… … Wikipedia
Hungary — /hung geuh ree/, n. a republic in central Europe. 9,935,774; 35,926 sq. mi. (93,050 sq. km). Cap.: Budapest. Hungarian, Magyarország. * * * Hungary Introduction Hungary Background: Hungary was part of the polyglot Austro Hungarian Empire, which… … Universalium
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Google Chrome — This article is about the web browser. For the operating system, see Google Chrome OS. Google Chrome … Wikipedia