crypto processor

crypto processor
криптопроцессор

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "crypto processor" в других словарях:

  • Crypto Operating System — This article is about the COS operating system. For the µC/OS real time kernel, see MicroC/OS II. For the ChibiOS real time operating system, see ChibiOS/RT. Crypto Operating System (COS) was the development name of a Mac compatible operating… …   Wikipedia

  • Système d'exploitation pour carte à puce — Les systèmes d exploitation pour carte à puce aussi appelés COS[note 1] assurent fondamentalement les mêmes fonctions que les autres systèmes d exploitation, mais dans un contexte matériel où les limitations matérielles et les problématiques de… …   Wikipédia en Français

  • LEVIATHAN (cipher) — processor.LEVIATHAN is considered broken due to distinguishing attacks which require 236 bytes of output and comparable effort. [cite conference | first = P. | last = Crowley | authorlink = Paul Crowley (cryptographer) | coauthors = Lucks, S. |… …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Military equipment of Turkey — The military equipment of Turkey includes a wide array of arms, artilleries, large surface vessels, cannons, armored vehicles, mortars, unmanned vehicles and many different equipments. Contents 1 Historical development 1.1 General 1.2 1923 1950 …   Wikipedia

  • List of computer technology code names — Following is a list of code names that have been used to identify computer hardware and software products while in development. In some cases, the code name became the completed product s name, but most of these code names are no longer used once …   Wikipedia

  • Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… …   Wikipedia

  • Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… …   Wikipedia

  • UltraSPARC T2 — Micrograph Produced 2007 Designed by Sun Microsystems Common manufacturer(s) …   Wikipedia

  • Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …   Wikipedia

  • Procfs — Sur les systèmes du type Unix, procfs (process file system, système de fichiers processus en anglais) est un pseudo système de fichiers (pseudo car dynamiquement généré au démarrage[1]) utilisé pour accéder aux informations du noyau sur les… …   Wikipédia en Français


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»