asymmetric algorithm

асимметричный алгоритм (шифрования)

English-Russian cryptological dictionary . 2014.

Смотреть что такое "asymmetric algorithm" в других словарях:

  • Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may …   Wikipedia

  • Optimal asymmetric encryption padding — This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [1]. In cryptography, Optimal Asymmetric… …   Wikipedia

  • Paxos algorithm — Paxos is a family of protocols for solving consensus in a network of unreliable processors.Consensus is the process of agreeing on one result among a group of participants. This problem becomes difficult when the participants or their… …   Wikipedia

  • Digital Signature Algorithm — The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature… …   Wikipedia

  • Optimal Asymmetric Encryption Padding — This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [http://www.oaep.go.th/english/index.html] …   Wikipedia

  • GGH encryption algorithm — The Goldreich Goldwasser Halevi (GGH) signature scheme is an asymmetric key encryption algorithm proposed in 1995 and published in 1997, based on solving the close vector problem (CVP) in a lattice. The encrypter uses the public key, a bad… …   Wikipedia

  • Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • List of eponyms (L-Z) — An eponym is a person (real or fictitious) whose name has become identified with a particular object or activity. NOTOC Here is a list of eponyms:A–K L M N–O P Q–R S T U–V W X–ZL* Rudolf Laban choreographer, created labanotation. * Ferruccio… …   Wikipedia

  • Tron (hacker) — Boris Floricic, better known by his pseudonym Tron (June 8, 1972 ndash; 17 22 October, 1998), was a German hacker and phreaker whose death in unclear circumstances has led to various conspiracy theories. He is also known for his diploma thesis… …   Wikipedia

  • List of eponyms — An eponym is a person (real or fictitious) from whom something is said to take its name. The word is back formed from eponymous , from the Greek eponymos meaning giving name . NOTOC Here is a list of eponyms:A B C D E F G H I–J K L–ZA* Achilles,… …   Wikipedia

Книги

Другие книги по запросу «asymmetric algorithm» >>

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.