russian encryption algorithm

  • 1российский алгоритм шифрования — ГОСТ 28147 89 [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4162] Тематики защита информации EN russian encryption algorithm …

    Справочник технического переводчика

  • 2Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …

    Wikipedia

  • 3ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev …

    Wikipedia

  • 4RAR — Infobox file format name = RAR extension = .rar, .rev, formerly .r00, .r01, etc. mime = application/x rar compressedapplication/octet stream owner = Eugene Roshal creatorcode = genre = Archive format containerfor = containedby = extendedfrom =… …

    Wikipedia

  • 5GOST (block cipher) — Infobox block cipher name = GOST 28147 89 caption = Diagram of GOST designers = USSR publish date = 1994 (declassified) derived from = derived to = key size = 256 bits block size = 64 bits structure = Feistel network rounds = 32 cryptanalysis =… …

    Wikipedia

  • 6Strong cryptography — or cryptographically strong are general terms applied cryptographic systems or components that are considered highly resistant to cryptanalysis. Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring… …

    Wikipedia

  • 7Plaintext — This article is about cryptography. For the computing term meaning the storage of textual material that is (largely) unformatted, see plain text. In cryptography, plaintext is information a sender wishes to transmit to a receiver. Cleartext is… …

    Wikipedia

  • 8List of programmers — This list is incomplete; you can help by expanding it. This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions. Contents: A B C D E F G H I J K L M N …

    Wikipedia

  • 9Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …

    Wikipedia

  • 10Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses …

    Wikipedia