attack-proof


attack-proof
криптостойкий, стойкий к криптоанализу

English-Russian cryptological dictionary . 2014.

Смотреть что такое "attack-proof" в других словарях:

  • proof — [[t]pruf[/t]] n. 1) evidence sufficient to establish a thing as true or believable 2) anything serving as such evidence 3) the act of testing or trying anything; test; trial: to put a thing to the proof[/ex] 4) the establishment of the truth of… …   From formal English to slang

  • Proof Of Destruction — (P.O.D.) is a computer game for the Commodore 64, developed by Mr. Chip Software and published by Mastertronic. It is a shooter, Centipede like game released in 1987, featuring up to two player spaceships moving about on a grid, trying to kill… …   Wikipedia

  • Proof (comics) — Supercbbox title = Proof caption = schedule = Monthly ongoing = y Horror = y publisher = Image Comics date= October 2007 issues = 8 (as of May 2008) main char team = John Prufrock writers = Alex Grecian artists = Riley Rossmo colorists = creative …   Wikipedia

  • proof — [[t]pru͟ːf[/t]] ♦♦♦ proofs 1) N VAR: oft N of n, N that Proof is a fact, argument, or piece of evidence which shows that something is definitely true or definitely exists. You have to have proof of residence in the state of Texas, such as a Texas …   English dictionary

  • PNS Mehran attack — Part of series of insurgent attacks in Pakistan Date 22–23 May 2011 Location Karachi, Sindh, Pakistan …   Wikipedia

  • Coppersmith's Attack — describes a class of attacks on the public key cryptosystem RSA based on Coppersmith s theorem (see below). The public key in the RSA system is a tuple of integers (N,e), where N is the product of two primes p and q. The secret key is given by an …   Wikipedia

  • Massive Attack — en concert (2006) Pays d’origine …   Wikipédia en Français

  • Camp Chapman attack — Location Khost Province, Afghanistan Date December 30, 2009 Target CIA facility Attack type Suicide bombing …   Wikipedia

  • Replay attack — A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it,… …   Wikipedia

  • Shark attack — For the film, see Shark Attack (film). Shark attack Classification and external resources A sign warning about the presence of sharks off Salt Rock, South Africa …   Wikipedia

  • Massive Attack discography — Massive Attack discography Massive Attack in concert Releases …   Wikipedia

Книги

Другие книги по запросу «attack-proof» >>


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.