# asymmetric algorithm

- асимметричный алгоритм (шифрования)

*English-Russian cryptological dictionary .
2014.*

### Смотреть что такое "asymmetric algorithm" в других словарях:

**Symmetric-key algorithm**— Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia**Optimal asymmetric encryption padding**— This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [1]. In cryptography, Optimal Asymmetric… … Wikipedia**Paxos algorithm**— Paxos is a family of protocols for solving consensus in a network of unreliable processors.Consensus is the process of agreeing on one result among a group of participants. This problem becomes difficult when the participants or their… … Wikipedia**Digital Signature Algorithm**— The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature… … Wikipedia**Optimal Asymmetric Encryption Padding**— This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [http://www.oaep.go.th/english/index.html] … Wikipedia**GGH encryption algorithm**— The Goldreich Goldwasser Halevi (GGH) signature scheme is an asymmetric key encryption algorithm proposed in 1995 and published in 1997, based on solving the close vector problem (CVP) in a lattice. The encrypter uses the public key, a bad… … Wikipedia**Key size**— In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia**History of cryptography**— The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia**List of eponyms (L-Z)**— An eponym is a person (real or fictitious) whose name has become identified with a particular object or activity. NOTOC Here is a list of eponyms:A–K L M N–O P Q–R S T U–V W X–ZL* Rudolf Laban choreographer, created labanotation. * Ferruccio… … Wikipedia**Tron (hacker)**— Boris Floricic, better known by his pseudonym Tron (June 8, 1972 ndash; 17 22 October, 1998), was a German hacker and phreaker whose death in unclear circumstances has led to various conspiracy theories. He is also known for his diploma thesis… … Wikipedia**List of eponyms**— An eponym is a person (real or fictitious) from whom something is said to take its name. The word is back formed from eponymous , from the Greek eponymos meaning giving name . NOTOC Here is a list of eponyms:A B C D E F G H I–J K L–ZA* Achilles,… … Wikipedia

### Книги

- Elliptic Curve Cryptography as suitable solution for mobile devices, Tadeusz Struk, Many different cryptography solutions are there to protect computers and networks, but since more mobile devices are Internet capable and are being used for day to day computing there is a… Категория: Книги Издатель: Книга по Требованию, Подробнее Купить за 9339 руб
- Implementation of Elliptic curve cryptosystem, Jhajharia Smita, Cryptographic systems are divided into two kinds. One is symmetric and other is asymmetric. In symmetric we require only a single key to encrypt and decrypt the data while asymmetric or… Категория: Научная литература Подробнее Купить за 7402 руб
- Elliptic Curve Cryptography as suitable solution for mobile devices, Tadeusz Struk, Many different cryptography solutions are there to protect computers and networks, but since more mobile devices are Internet capable and are being used for day to day computing there is a… Категория: Информационные технологии Издатель: LAP Lambert Academic Publishing, Подробнее Купить за 4985 руб