- key-searching method
- метод поиска (раскрытия) ключа
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Virtual storage access method — (VSAM) is an IBM disk file storage access method, first used in the OS/VS2 operating system, later used throughout the Multiple Virtual Storage (MVS) architecture and now in z/OS. Originally a record oriented filesystem, VSAM comprises four data… … Wikipedia
Four corner method — The Four Corner Method (literal translation) (zh tsp|t=四角號碼檢字法|s=四角号码检字法|p=sì jiǎo hào mǎ jiǎn zì fǎ) is a character input method used for encoding Chinese characters either into a computer, or a manual typewriter, using four numerical digits per … Wikipedia
Conjugate gradient method — A comparison of the convergence of gradient descent with optimal step size (in green) and conjugate vector (in red) for minimizing a quadratic function associated with a given linear system. Conjugate gradient, assuming exact arithmetic,… … Wikipedia
Brute force attack — In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, possible keys in order to decrypt a message. In most schemes, the theoretical possibility of a brute… … Wikipedia
IbisBrowser — is a web browser which is designed for mobile phones. It is a client server type application that has been developed in 2005 by ibis inc., a Japanese company. The first version of the browser, developed in Java (MIDP 2.0) and run on a Java… … Wikipedia
literature — /lit euhr euh cheuhr, choor , li treuh /, n. 1. writings in which expression and form, in connection with ideas of permanent and universal interest, are characteristic or essential features, as poetry, novels, history, biography, and essays. 2.… … Universalium
information processing — Acquisition, recording, organization, retrieval, display, and dissemination of information. Today the term usually refers to computer based operations. Information processing consists of locating and capturing information, using software to… … Universalium
Net capital rule — The uniform net capital rule is a rule created by the U.S. Securities and Exchange Commission ( SEC ) in 1975 to regulate directly the ability of broker dealers to meet their financial obligations to customers and other creditors.[1] Broker… … Wikipedia
HEBREW LITERATURE, MODERN — definition and scope beginnings periodization … Encyclopedia of Judaism
Hash table — Not to be confused with Hash list or Hash tree. Unordered map redirects here. For the proposed C++ class, see unordered map (C++). Hash Table Type unsorted dictionary Invented 1953 Time complexity in big O notation Average Worst case Space … Wikipedia