این صفحه هماکنون متنی ندارد. شما میتوانید در دیگر صفحات این عنوان را جستجو کنید، یا سیاهههای مرتبط را بگردید ولی شما اجازه ایجاد این صفحه را ندارید.
رده:رمزشناسی
صفحههای ردهٔ «رمزشناسی»
این ۲۰۰ صفحه در این رده قرار دارند؛ این رده در کل حاوی ۳۸۰ صفحه است.
(صفحهٔ قبلی) (صفحهٔ بعدی)A
- Access control
- Access level
- Access protection
- Accountability
- Accumulator
- Active adversary
- Active attack
- Active cheater
- Active cryptanalysis
- Active wiretapping
- Adaptive chosen ciphertext attack
- Adaptive chosen message attack
- Adaptive chosen plaintext attack
- Add-on security
- Adequate security
- Algebraic attack
- Algebraic immunity degree
- All-or-nothing encryption
- Anonymity
- Anonymizer
- Asymmetric cryptography
- Atomicity
- Atomicity property
- Attack
- Attribute certificate
- Attribute-based access control
- Attribute-based encryption
- Attributes authority
- Attributes management
- Audio steganography
- Auditability
- Auto-key
- Auto-key cipher
- Avalanche criterion
- Avalanche effect
B
- Backdoor
- Backward
- Backward secrecy
- Balance property
- Baseline security
- Bi-deniable encryption
- Bilinear Diffie-Hellman problem
- Binding
- Biometric
- Biometrics
- Birthday attack
- Bit
- Bit independence criterion
- Blind signature
- Blind watermarking
- Blinded message
- Blinding
- Block
- Branch number
- Broadcast encryption
- Brute force attack
C
- Cascade
- Cascade cipher
- Certificate revocation list
- Certification
- Certification authority
- Certification policy
- Certification practice statement
- Challenge-response authentication
- Challenge-response identification
- Cheater
- Chosen ciphertext attack
- Chosen message attack
- Chosen plaintext attack
- Chosen related key attack
- Cipher
- Cipher feedback mode
- Cipher text auto-key
- Ciphertext-ciphertext compromise
- Ciphertext-only attack
- Ciphertext/ cipher text
- Ciphony
- CIRT
- Cladding
- Cleartext/ clear text
- Clock-controlled generator
- Coding
- Collision attack
- Collision free hash function
- Collision resistance
- Common criteria
- Common criteria for information technology security
- Communications cover
- Communications deception
- Communications profile
- Communications security
- Compartmentalization
- Compromise
- Compromised key
- Computational security
- Computationally secure steganography
- Computer fraud
- Computer incident response centre
- Computer incident response team
- Computer security incident response team
- Correlation immunity
- Counter mode
- Covertext
- Cryptanalysis
- Cryptanalyst
- Crypto officer
- Crypto period
- Cryptogram
- Cryptographer
- Cryptographic
- Cryptographic algorithm
- Cryptographic hash function
- Cryptographic module
- Cryptographic module security policy
- Cryptographic security
- Cryptographic strength
- Cryptography
- Cryptological
- Cryptologist
- Cryptology
- Cryptosystem
- Cybercrime
D
- Data
- Data analysis
- Data confidentiality service
- Data decryption
- Data encryption
- Data encryption standard
- Data protection
- Data security
- Decipher
- Deciphering
- Decisional Diffie-Hellman problem
- Decrypted
- Decryption mixnet
- Deniable encryption
- Derived key
- Designated-verifier signature
- Deterministic encryption
- Dictionary attack
- Differential cryptanalysis
- Differential linear attack
- Differential-linear attack
- Diffie-Hellman problem
- Digital signature schemes
- Digital steganography
- Discretionary access conrtol
- Distinguishing attack
- Divide-and-conquer attack
- Dynamic adversary
E
- E-
- E-government
- E-kiosk
- E-money
- E-payment
- Eavesdropper
- Eavesdropping
- Efficiency
- Efficient
- Electromagnetic attack
- Electronic
- Electronic cheque
- Electronic commerce
- Electronic kiosk
- Electronic money
- Electronic payment
- Electronic security
- Electronic services
- Electronic signature
- Elliptic curve cryptography
- Encipher
- Enciphered
- Enciphered code
- Enciphering
- Encrypted data
- Encrypted text
- Encryption algorithm
- End-to-end encryption
- End-to-end security
- Entrapment
- Ephemeral key
- Exhaustive key search
- Existential forgery