- crypto only mode
- режим работы только с криптографической защитой
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Crypto phone — Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance. The interception of telecommunications has become a major industry. Most of the world s intelligence agencies and many private… … Wikipedia
Crypto-1 — NXP Crypto 1 General Designers Philips/NXP First published October 6 2008 Cipher detail … Wikipedia
EAX mode — is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated Data (AEAD) algorithm designed to simultaneously protect both authentication and privacy of the message (Authenticated encryption) with a… … Wikipedia
режим работы только с криптографической защитой — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN crypto only mode … Справочник технического переводчика
The Real Presence of Christ in the Eucharist — The Real Presence of Christ in the Eucharist † Catholic Encyclopedia ► The Real Presence of Christ in the Eucharist In this article we shall consider: ♦ the fact of the Real Presence, which is, indeed, the central dogma; ♦ the … Catholic encyclopedia
ZFS — Infobox Filesystem full name = ZFS name = ZFS developer = Sun Microsystems introduction os = OpenSolaris introduction date = November 2005 partition id = directory struct = Extensible hash table file struct = bad blocks struct = max filename size … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Destroy All Humans! Path of the Furon — Developer(s) Sandblast Games Publisher … Wikipedia
Destroy All Humans! 2 — Make War Not Love Developer(s) Pandemic Studios Publisher(s) THQ … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… … Wikipedia