- cryptographic hardware
- шифровальная аппаратура;
шифровальное оборудование
Большой англо-русский и русско-английский словарь. 2001.
Большой англо-русский и русско-английский словарь. 2001.
Cryptographic accelerator — A cryptographic accelerator is a device that performs processor intensive decrypting/encrypting while freeing the host CPU to perform other tasks. In general cryptographic accelerator is a co processor. Common use for cryptographic accelerator is … Wikipedia
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Hardware security module — Pour les articles homonymes, voir HSM. Un Hardware Security Module HSM[1] (Module Matériel de Sécurité) est un appareil considéré comme inviolable offrant des fonctions cryptographiques. Il s agit d un matériel électronique offrant un service de… … Wikipédia en Français
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… … Wikipedia
Cryptographic Service Provider — In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Hardware Security Module — Pour les articles homonymes, voir HSM. Un Hardware Security Module HSM[1] (Module Matériel de Sécurité) est un appareil considéré comme inviolable offrant des fonctions cryptographiques. Il s agit d un matériel électronique offrant un service de… … Wikipédia en Français
Cryptographic device — An ISO term. The electronic hardware part, or subassembly which implements the encipherment algorithm … International financial encyclopaedia
Custom hardware attack — The EFF s Deep Crack machine contained 1,856 custom chips and could brute force a DES key in a matter of days the photo shows a circuit board fitted with 32 custom attack chips In cryptography, a custom hardware attack uses specifically designed… … Wikipedia
History of computing hardware — Computing hardware is a platform for information processing (block diagram) The history of computing hardware is the record of the ongoing effort to make computer hardware faster, cheaper, and capable of storing more data. Computing hardware… … Wikipedia