- cryptographic expert
- эксперт в области криптографии
English-Russian cryptological dictionary . 2014.
English-Russian cryptological dictionary . 2014.
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
эксперт в области криптографии — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN cryptographic expert … Справочник технического переводчика
Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… … Wikipedia
Electronic voting — Election technology Certification of voting machines Independent Testing Authority (ITA) NVLAP VVSG End to end auditable voting systems Help America Vote Act Independent verific … Wikipedia
Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… … Wikipedia
Export of cryptography in the United States — The export of cryptography in the United States is the transfer from the United States to another country of devices and technology related to cryptography. Since World War II, many governments, including the U.S. and its NATO allies, have… … Wikipedia
Export of cryptography — The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.Since World War II, Western governments, including the U.S. and its NATO allies, have regulated the export of cryptography… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… … Wikipedia
List of computer science conferences — This is a list of academic conferences in computer science. Most of these academic conferences are annual or bi annual events.The order with which the conferences are listed in their respective fields corresponds to a rough and non authoritative… … Wikipedia
William F. Friedman — Infobox Engineer image width = 180px caption = William F. Friedman name = William F. Friedman nationality = United States birth date = September 24, 1891 birth place = Kishinev, Bessarabia death date = November 12, 1969 death place = education =… … Wikipedia