- cryptographic technique
- криптографический метод, криптографическая техника и технология
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic Test Correction — is a technique, published in 2008 by Eric Levieil and David Naccache [1] for shifting the burden of correcting Multiple Choice Questionnaires (MQC) to examinees. Because the corrector is only interested in the number of correct answers and not in … Wikipedia
Public Key Cryptographic Standards — Les PKCS (Public Key Cryptographic Standards), ou standards de cryptographie à clé publique, sont un ensemble de spécifications conçues par les laboratoires RSA en Californie. La société RSA Security est spécialisée dans les solutions de sécurité … Wikipédia en Français
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Chaffing and winnowing — is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with… … Wikipedia
William F. Friedman — Infobox Engineer image width = 180px caption = William F. Friedman name = William F. Friedman nationality = United States birth date = September 24, 1891 birth place = Kishinev, Bessarabia death date = November 12, 1969 death place = education =… … Wikipedia
Deniable encryption — In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it[citation needed]. Such convincing denials may or may not be genuine.… … Wikipedia
CRYPTREC — CRYPTREC Cryptography Research and Evaluation Committees, основаны японским правительством, для оценки и рекомендации шифровальных методов для правительственного и индустриального использования. CRYPTREC привлек передовых криптографов всего … Википедия
Rabin cryptosystem — The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization. However the Rabin cryptosystem has the advantage that the problem on which it relies has been proved … Wikipedia
Visual cryptography — is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers.Visual cryptography was pioneered by… … Wikipedia
ARIA (cipher) — Infobox block cipher name = ARIA designers = publish date = 2003 derived from = AES derived to = related to = certification = South Korean standard key size = 128, 192, or 256 bits block size = 128 bits structure = Substitution permutation… … Wikipedia