- compute a digital signature on a certain message
- вычислить цифровую подпись для некоторого сообщения

*English-Russian cryptological dictionary .
2014.*

### Смотреть что такое "compute a digital signature on a certain message" в других словарях:

**Quantum digital signature**— A Quantum Digital Signature (QDS) refers to the quantum mechanical equivalent of either a classical digital signature or, more generally, a handwritten signature on a paper document. Like a handwritten signature, a digital signature is used to… … Wikipedia**Digital photography**— Nikon D700 a 12.1 megapixel full frame DSLR … Wikipedia**ElGamal signature scheme**— The ElGamal signature scheme is a digital signature scheme which is based on the difficulty of computing discrete logarithms. It was described by Taher ElGamal in 1984 (see T. ElGamal, A public key cryptosystem and a signature scheme based on… … Wikipedia**Measurement and Signature Intelligence**— Measurement and Signature Intelligence, or MASINT, refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of the major disciplines mentioned above. As a means of collecting… … Wikipedia**Public-key cryptography**— In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia**Cryptography**— Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia**Unbalanced Oil and Vinegar**— The Unbalanced Oil and Vinegar scheme is a modified version of the Oil and Vinegar scheme designed by J. Patarin. Both are Digital signature schemes, used in Cryptography. They belong to the group of Multivariate Cryptography. The security of… … Wikipedia**Elliptic curve cryptography**— (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… … Wikipedia**Trusted timestamping**— is the process of securely keeping track of the creation and modification time of a document. Security here means that no one not even the owner of the document should be able to change it once it has been recorded provided that the timestamper s … Wikipedia**NTRUEncrypt**— The NTRUEncrypt public key cryptosystem, also known as the NTRU encryption algorithm, is a lattice based alternative to RSA and ECC and is based on the shortest vector problem in a lattice (i.e. is not breakable using quantum computers).… … Wikipedia**SHA hash functions**— The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms … Wikipedia