- crypto processor
- криптопроцессор
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Crypto Operating System — This article is about the COS operating system. For the µC/OS real time kernel, see MicroC/OS II. For the ChibiOS real time operating system, see ChibiOS/RT. Crypto Operating System (COS) was the development name of a Mac compatible operating… … Wikipedia
Système d'exploitation pour carte à puce — Les systèmes d exploitation pour carte à puce aussi appelés COS[note 1] assurent fondamentalement les mêmes fonctions que les autres systèmes d exploitation, mais dans un contexte matériel où les limitations matérielles et les problématiques de… … Wikipédia en Français
LEVIATHAN (cipher) — processor.LEVIATHAN is considered broken due to distinguishing attacks which require 236 bytes of output and comparable effort. [cite conference | first = P. | last = Crowley | authorlink = Paul Crowley (cryptographer) | coauthors = Lucks, S. |… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Military equipment of Turkey — The military equipment of Turkey includes a wide array of arms, artilleries, large surface vessels, cannons, armored vehicles, mortars, unmanned vehicles and many different equipments. Contents 1 Historical development 1.1 General 1.2 1923 1950 … Wikipedia
List of computer technology code names — Following is a list of code names that have been used to identify computer hardware and software products while in development. In some cases, the code name became the completed product s name, but most of these code names are no longer used once … Wikipedia
Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
UltraSPARC T2 — Micrograph Produced 2007 Designed by Sun Microsystems Common manufacturer(s) … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Procfs — Sur les systèmes du type Unix, procfs (process file system, système de fichiers processus en anglais) est un pseudo système de fichiers (pseudo car dynamiquement généré au démarrage[1]) utilisé pour accéder aux informations du noyau sur les… … Wikipédia en Français