Новости переводов

02 февраля, 2018

“Professional translation” means...

26 января, 2018

Professional Translation in the Field of Electrical Engineering and Microelectronics

23 декабря, 2017

Translation and Prices

Поиск в глоссариях:  

Cryptographic assumption

Словарь в сфере информационной безопасности

    Криптографическое (криптологическое) предположение, русский

    Assumptio [onis, f], латинский

    Assumption, английский
    1. Becoming responsible for the liabilities of another party.

    2. Allows a buyer to assume responsibility for an existing loan instead of getting a new loan.

    3. Предположение

    Assumption fee, английский

    Assumption of mortgage, английский

    Assumption of risk, английский
      A defense to a lawsuit for personal injury. the essence of the defense is that the plaintiff assumed the known risk of whatever dangerous condition caused the injury

    Assumptionist, английский

    Cryptographic, английский

    Cryptographic algorithm, английский

    Cryptographic checkvalue, английский

    Cryptographic device, английский

    Cryptographic function, английский

    Cryptographic hardware (device, facility), английский

    Cryptographic hash function, английский
      Ithe cryptographic hash function is a mathematical algorithm that takes a particular input which can be any kind of digital data be it a password or jpeg file and produces a single fixed length output. some examples of different hash function algorithms are md5, md4 or sha256. the last one is used in the bitcoin protocol. main properties: (1) easy to compute hash value for any given message (2) infeasible to generate a message from its hash except by trying all possible input combinations(brute force attack) (3) infeasible to modify a message without changing the hash (4) infeasible to find two different messages with the same hash (5) deterministic so the same message always results in the same hash. cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (macs), and other forms of authentication. they can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption

    Cryptographic hash function with key, английский

    Cryptographic information protection facility, английский

    Cryptographic key disclosure, английский

    Cryptographic operation, английский

    Cryptographic primitive, английский

    Cryptographic protection, английский

    Cryptographic protection of information, английский

    Cryptographic device, английский

    Криптографическое (криптологическое) предположение, русский