Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Public key algorithm

Глоссарий ИТ-терминов
    An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. as implied by the key names, the public key used to encode plaintext can be made available to anyone. however, the private key must remain secret. only the private key can decrypt the ciphertext. the public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message.




Asymmetric, английский
  1. Асимметричные - определенный вид досок, сконструированных специально для плавания на больших волнах, которые имеют асимметричную форму кормы - укороченную на одной стороне, удлиненную с другой. они были разработаны и появились на рынке как специальное реш

  2. Асимметричный


Encryption, английский
  1. The process of transforming text into an unintelligible form called cipher.

  2. A method of encoding data for security.

  3. Защита сообщения от неправомочного прочтения, основанная на преобразовании его в шифрованный текст. расшифровать этот текст, т.е. восстановить исходное сообщение, можно только с помощью ключа, использовавшегося при его шифровании

  4. The rearrangement of the bit stream of a previously digitally encoded signal in a

  5. An encoder electronically alters a signal so that it can be clearly seen only by recipients who have a decoder to reverse encryption. selective addressability/scrambling designates receivers to descramble a signal. each decoder has a unique address.

  6. The rearrangement of the bit stream of a previously digitally encoded signal in a systematic fashion to make the information unrecognizable until restored on receipt of the necessary authorization key. this technique is used for securing information transmitted over a communication channel with the intent of excluding all other than authorized receivers from interpreting the message. can be used for voice, video and other communications signals.

  7. Encryption is a process by which a document (plaintext) is combined with a shorter string of data, called a key (eg. ), to produce an output (ciphertext) which can be "decrypted" back into the original plaintext by someone else who has the key, but which is incomprehensible and computationally infeasible to decrypt for anyone who does not have the key.

  8. Шифрование

  9. The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.

  10. To use a code to render data unintelligible. an encryption key is data that when supplied to an encryption program and the original data to be encrypted yields the encrypted data. a decryption key when supplied with a decryption program and encrypted data the recovers the original data. many times these two keys are the same.

  11. Кодирование (в телефонии, банковской связи)


Decryption, английский
  1. Converting data from the unintelligible ciphertext back to plaintext. the reverse of data encryption.

  2. Расшифровывание; расшифровка; дешифрация; дешифровывание

  3. The act of restoring an encrypted file to its original state.

  4. The process of converting encrypted content back into its original form to make it readable again. this is also called converting ciphertext back to plaintext.


Ciphertext, английский
  1. Unreadible text resulting from encryption.

  2. Зашифрованный текст; шифротекст

  3. Data that has been encrypted.


Algorithms, английский
    Complex mathematical formulae or rules used to solve complex problems in cctv they are used to achieve digital compression of a video picture.


Post-event, английский
    An asynchronous event whose handler runs only after the action that raised the event is complete.


Asymmetric algorithm, английский
    An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. as implied by the key names, the public key used to encode plaintext can be made available to anyone. however, the private key must remain secret. only the private key can decrypt the ciphertext. the public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message.