transparent cryptography - перевод на русский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

transparent cryptography - перевод на русский

LIFE-SIZED ANATOMICAL HUMAN MODEL USED IN EDUCATION
Transparent anatomical manikin; Transparent Anatomical Mannikin; Transparent anatomical mannequin; Transparent woman; Transparent man; Transparent women; Transparent men; User:Djd/sandbox/Transparent men
  • Transparent Anatomical Manikin (TAM)

transparent cryptography      
прозрачная криптосистема (не требующая от пользователя знания ее принципов)
public key cryptography         
  • digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.
  • In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.
  • symmetric cipher]] which will be, in essentially all cases, much faster.
CRYPTOSYSTEM THAT USES BOTH PUBLIC AND PRIVATE KEYS
Private key; Asymmetric key algorithm; Public key algorithm; Public key; Public key cryptography; Asymmetric key cryptography; Public key encyption; Public key crytography; Asymmetric key; Asymmetric key encryption algorithm; Public key encryption; Public-key encryption; Public-key; Asymmetric key encryption; Asymmetric cryptography; Non-secret encryption; Asymmetric key algorithms; Asymmetric encryption; Keypair cryptography; Public Key Cryptography; Private key encryption; Public-key cryptosystem; Public key cryptosystem; Assymetric key cryptography; PubKey; Asymmetric-key cryptography; Asynchronous encryption; Public/private key cryptography; Asymmetric-key algorithm; Key pair; Keypair; Key Pair; Asymmetric crypto; Public encryption key; Asymmetric cryptosystem; Asymmetric cypher; Asymmetric cipher; Asymmetric algorithm; Asymmetric Algorithms; Public Key Encryption; Private Key Encryption; Secret-key; Key pairs; Asymmetric-key cryptosystem; Public key pair; Public-key encrytption; Asymmetrical encryption; Private keys; Applications of public-key cryptography
криптография с открытым ключом, двухключевая криптография, криптография множественного доступа
asymmetric encryption         
  • digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.
  • In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.
  • symmetric cipher]] which will be, in essentially all cases, much faster.
CRYPTOSYSTEM THAT USES BOTH PUBLIC AND PRIVATE KEYS
Private key; Asymmetric key algorithm; Public key algorithm; Public key; Public key cryptography; Asymmetric key cryptography; Public key encyption; Public key crytography; Asymmetric key; Asymmetric key encryption algorithm; Public key encryption; Public-key encryption; Public-key; Asymmetric key encryption; Asymmetric cryptography; Non-secret encryption; Asymmetric key algorithms; Asymmetric encryption; Keypair cryptography; Public Key Cryptography; Private key encryption; Public-key cryptosystem; Public key cryptosystem; Assymetric key cryptography; PubKey; Asymmetric-key cryptography; Asynchronous encryption; Public/private key cryptography; Asymmetric-key algorithm; Key pair; Keypair; Key Pair; Asymmetric crypto; Public encryption key; Asymmetric cryptosystem; Asymmetric cypher; Asymmetric cipher; Asymmetric algorithm; Asymmetric Algorithms; Public Key Encryption; Private Key Encryption; Secret-key; Key pairs; Asymmetric-key cryptosystem; Public key pair; Public-key encrytption; Asymmetrical encryption; Private keys; Applications of public-key cryptography
асимметричное шифрование (в двухключевой криптосистеме) асимметричное шифрование (в двухключевой криптосистеме)

Определение

private key
<cryptography> A piece of data used in {private-key cryptography} and public-key cryptography. In the former the private key is known by both sender and recipient whereas in the latter it is known only to the sender. (2008-02-07)

Википедия

Transparent Anatomical Manikin

The Transparent Anatomical Manikin (TAM) is a three-dimensional, transparent anatomical model of a human being, created for medical instructional purposes. TAM was created by designer Richard Rush in 1968. It consisted of a see-through reproduction of a female human body, with various organs being wired so specific body systems would light up on command, on cue with a pre-recorded educational presentation.

Rush eventually produced 42 TAMs, many of which are still displayed in US health education museums. A cheaper model, the Mobile TAM, was created by Rush in the 1980s.

The Transparent Anatomical Manikin was used as cover art on the 1970 soundtrack album Music from The Body, by Roger Waters and Ron Geesin, and the American alternative rock band Nirvana's 1993 album In Utero.

Как переводится transparent cryptography на Русский язык