randomly chosen bit

randomly chosen bit
случайно выбранный бит (напр. ключа)

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "randomly chosen bit" в других словарях:

  • Next-bit test — In cryptography and the theory of computation, the next bit test[1] is a test against pseudo random number generators. We say that a sequence of bits passes the next bit test for at any position i in the sequence, if an attacker knows the i first …   Wikipedia

  • One-way compression function — In cryptography, a one way compression function is a function that transforms two fixed length inputs to an output of the same size as one of the inputs. The transformation is one way , meaning that it is difficult given a particular output to… …   Wikipedia

  • Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… …   Wikipedia

  • Locality sensitive hashing — (LSH) is a method of performing probabilistic dimension reduction of high dimensional data. The basic idea is to hash the input items so that similar items are mapped to the same buckets with high probability (the number of buckets being much… …   Wikipedia

  • Ciphertext indistinguishability — is a property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of indistinguishability, then an adversary will be unable to distinguish pairs of ciphertexts based on the message they encrypt. The property of… …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • PaX — In computer security, PaX is a patch for the Linux kernel that implements least privilege protections for memory pages. The least privilege approach allows computer programs to do only what they have to do in order to be able to execute properly …   Wikipedia

  • Lancet surveys of Iraq War casualties — The Lancet , one of the oldest scientific medical journals in the world, published two peer reviewed studies on the effect of the 2003 invasion of Iraq and subsequent occupation on Iraqi mortality. The first was published in 2004; the second (by… …   Wikipedia

  • Winning Streak — To learn about the American game show of the same name, see Winning Streak (US game show). For sports winning streaks, check out Winning streak (sports) Infobox Television show name = Winning Streak caption = genre = Game show creator = writer =… …   Wikipedia

  • Multiply-with-carry — In computer science, multiply with carry (MWC) is a method invented by George Marsaglia for generating sequences of random integers based on an initial set of from two to many thousands of randomly chosen seed values. The main advantages of the… …   Wikipedia

  • iTunes — This article is about the application. For the online media service, see iTunes Store. iTunes iTunes 10.5 running on Mac OS X Lion …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»