小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > encryptionの意味・解説 > encryptionに関連した共起表現

「encryption」の共起表現一覧(1語右で並び替え)

該当件数 : 197



In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable fo
crypt files with a strong, readily available encryption algorithm such that a low percentage (1% - 0
on of the RSA Secret-Key Challenge, a 56-bit encryption algorithm that had a $10,000 USD prize avail
grapher at GCHQ who invented the widely-used encryption algorithm now commonly known as RSA, about t
in obscuring information about the choice of encryption algorithm if that information is freely avai
password being examined (including both the encryption algorithm and key), and comparing the output
Support for encryption algorithm AES, Twofish, Serpent, including t
It is an authenticated encryption algorithm designed to provide both data auth
Shamir and Leonard Adleman developed the RSA encryption algorithm in 1977.
d, in 1973, what has become known as the RSA encryption algorithm, realising Ellis' idea.
g the theory that the code is a One-time pad encryption algorithm.
Many "home grown" encryption algorithms reveal the key quite easily when
cryptographic library that has all the usual encryption algorithms needed by information security so
You may choose from five different encryption algorithms (DES-64bit, 3DES-192bit, AES-256b
ng attacks are practical against a number of encryption algorithms, including RSA, ElGamal, and the
rch areas including mathematics, statistics, encryption algorithms, neural networks, geophysics and
example, required security tokens, supported encryption algorithms, and privacy rules) and how to as
SHA-1, SHA-256/392/512 etc.) and public key encryption algorithms.
s, distributed link tracking, and file-level encryption, also known as the Encrypting File System (E
ddy is a simple software application for the encryption and compression of computer files to make th
ned by aspects of WS-Security, including XML Encryption and XML Digital Signatures.
GP SDK which provides signing, verification, encryption, and decryption of files.
Internet users to trust one another through encryption and authentication.
ess keys can be protected by a wide range of encryption and hashing algorithms provided by the libgc
acking, budget management and tracking, file encryption, and investment portfolio management.
PDF support includes transparency, encryption and a large set of the PDF 1.4 spec as well
wn as web optimization or fast web viewing), encryption, and decryption of PDF files.
d 31 of the NLFSR state as its inputs during encryption and bits 0, 8, 19, 25 and 30 during decrypti
ion, WS-Security Signatures, and WS-Security Encryption and included Windows Keystore, Java Keystore
It specifically targets the weaknesses of LM encryption, and includes pre-computed data sufficient t
he bits of the NLFSR state (bits 0 and 16 on encryption and bits 31 and 15 on decryption) and with a
phers that support single pass authenticated encryption and can operate as collision-resistant hash
quipment such as network management systems, encryption and networking solutions for internet connec
tary of Defense for Policy, concentrating on encryption and information assurance issues.
They also handled encryption and decryption.
Protecting the stored values (e.g., using encryption and replicated storage).
ion uses a 64-bit block cipher algorithm for encryption and a proprietary compression algorithm.
r Apple Mail that provides public key e-mail encryption and signing.
Palcrypt is an open source single file encryption and decryption program.
The Pro version uses encryption and optional password protection to keep doc
FileVault-On the fly encryption and decryption of a user's home folder
virus control), personal firewall, antispam, encryption, antispyware, and parental control.
sp supports image checksumming, compression, encryption as well as integration with Splashy.
Ciright platform incorporates 512 bit encryption at the device level.
on of cryptsetup, using dm-crypt as the disk encryption backend.
published articles on Export Restrictions on Encryption became required reading at Harvard Law Schoo
If there is end-to-end encryption between the sender and the recipient, then n
imprinted with the programming code for RSA encryption, boasting "This shirt is a controlled muniti
rs/software developers and new users to file encryption by combining strong encryption methods and a
If there's additional encryption by SYSKEY in the imported SAM file (it's on
Opportunistic encryption can be used to combat passive wiretapping.
RSA Lab's 72-bit RC5 Encryption Challenge - In progress, 1.677% complete as
It is also known for a series of high-speed encryption co-processors, offloading this processor-int
ryffen manages to alter Starkey's Department encryption code, so Starkey is no longer on the run, an
rted features include resultset caching, SSL encryption, custom data source, dbShield
rates with Nautilus, gedit and Evolution for encryption, decryption and other operations.
his smart card, various cryptographic tasks ( encryption, decryption, digital signing/verification, a
torage features such as backup and recovery, encryption, deduplication and provisioning.
n scrambling system was a form of television encryption developed by Oak Industries in the early 198
ware is also used as part of the CryptoStick encryption device from Research Triangle Software, Inc.
Mechanical encryption devices such as Enigma made these attacks mu
ion with Andrew Viterbi to develop satellite encryption devices.
Voodoo's method of encryption encrypts all transfers of data from the prog
File Encryption encrypts files and folders to secure from un
PROE - x86-64 encryption engine
Enigma - German message encryption equipment.
IBM - IBM Database Encryption Expert uses Vormetric encryption technology
security support - SSL encryption, FIPS 140-2 validation, RACF, ACF2, LDAP
ouble Latte, Stock Options, Sea of Cubicles, Encryption, Firewall, El Camino Real, The Sysadmin, and
ection, intrusion prevention, email and file encryption, firewalls, VPNs, vulnerability, and scannin
The service makes use of AES encryption for security, and uses data compression and
nearly impossible to stop the use of strong encryption for telephone communications.
mpany announced that it would soon offer SSL encryption for search (although not enabled by default)
compliance and regulatory agencies requiring encryption for data at rest including, Health Insurance
Encryption for the Masses (E4M) is a free disk encrypti
All protocols offer OpenSSL encryption for additional security.
where E is the encryption function (cipher), and K1 and K2 are the two
SMEG is an acronym for Simulated Metamorphic Encryption Generator.
Fileystem encryption has certain advantages and disadvantages ove
oftware development to security, a number of encryption implementations and early static analysis to
It uses 256-bits AES encryption in order to encrypt messages, thus ensuring
blic Key Infrastructure (PKI) and the use of encryption, Internet governance, intellectual property
However, the key used for encryption is established using a Diffie-Hellmann Key E
easiest way to enable opportunistic website encryption is by using self-signed certificates, but th
This is used when encryption is not a practical solution or in tandem wit
As of June/2007, OpenPGP encryption is being implemented.
d its receiver and then attempt to crack the encryption key being used to secure wireless communicat
Control over the SSH encryption key and protocol version.
ission, which is to encrypt, using a digital encryption key, all the files it finds on computer driv
using the oracle's key, without knowing the encryption key.
This is not the only attack that allows encryption keys to be read from memory-for example, a D
tates S1, S2 and S3) is generally unsafe, as encryption keys will remain in the computer's memory, a
overy requirements for the use of asymmetric encryption keys for security and authenticated transact
ing down a computer will usually discard the encryption keys from memory.
only available to authorised users with the encryption keys.
3) was a Swedish businessman and inventor of encryption machines.
pts of the sounds of cleartext printing from encryption machines.
This information might then reveal the encryption method used, some information about the encr
ntext file is created and encrypted with the encryption method under attack, such that the first cip
, a watermarking attack is an attack on disk encryption methods where the presence of a specially cr
, Blowfish, Twofish, CAST, and various other encryption methods.
ted using what was then the standard default encryption mode, CBC.
4344, The Secure Shell (SSH) Transport Layer Encryption Modes
e wiretapper, on the other hand, can disrupt encryption negotiation to force an unencrypted channel.
ased access control to information, and full encryption of stored information and communications bet
ernet with computers aiding the users in the encryption of their interactions.
Yet, it does make the encryption of most internet traffic easy to implement,
the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primar
Alix proposed a controversial scheme for DRM encryption of BBC content, which was the subject of a 4
s such that each block depends on the proper encryption of the previous block.
cure communication improvements (signing and encryption of user-defined SOAP headers, Kerberos Secur
encryption of credit card information
Encryption of system and bootable partitions with pre-b
FOPE also offers policy-based encryption of email messages.
XML Digital Signature and encryption of Atom documents
RSA standard that governs the storage and encryption of private keys.
The channel also dropped its Videoguard encryption on Sky Digital on 1 July 2005, switching to
ing all the processing, mixing, encoding and encryption on the clients, relieving the servers and in
GCM encryption operation
vides great flexibility to the user with its encryption options.
a product, typically a device that performs encryption or secure transactions, is tampered with dur
r private or public anonymous proxy servers, encryption or even spoofing, diversion and obfuscation
eBook publishers, Baen flatly refused to use encryption or even Adobe's Portable Document Format (PD
obtaining a password (either by cracking the encryption, or through social engineering).
branch added support for encryption, peer exchange, binary prefix, and UPnP.
Building in Big Brother: The Encryption Policy Debate (Editor), Springer-Verlag, New
Scramdisk is a free OTFE (On-The-Fly Encryption) program for Windows 95, Windows 98 and Wind
BestCrypt is a commercial disk encryption program for Windows and Linux, developed by
also claims to have written an "unbreakable" encryption program, and made predictions for the year 2
It is similar in function to other disk encryption programs including Microsoft's BitLocker.
This weakness affected many disk encryption programs, including older versions of BestCr
the first cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and Davi
eta-documents include: posting of asymmetric encryption public keys, posting tokens that would be re
servers receives another share of K and the encryption result of M using the key K , E(M,K).
nformation which reduces the security of the encryption scheme.
hoosing the key length of the RSA public-key encryption scheme.
In fact, certain artificial signature and encryption schemes are known which are proven secure in
premium version of CRT with support for SSH encryption, SecureCRT later replaced the CRT product en
It is a form of disk encryption software similar to Microsoft's Encrypting F
While most disk encryption software implements different and incompatib
atible with containers used by SecuBox (disk encryption software by Aiko Solutions)
Disk encryption software (also known as OTFE software)
the government for permission to publish his encryption software, Snuffle, and a paper describing it
He worked for Network Associates on the PGP encryption software, is a member of the Shmoo Group, a
he US government allows the export of 56-bit encryption software, and stronger encryption software f
Cryptophane is a GUI frontend for the GnuPG encryption software.
Mobile encryption solution
Unlike other Linux encryption solutions such as dm-crypt, eCryptfs uses Fi
, 2010: Acquired Mobile Armor; an innovative encryption specialist based in St. Louis, Missouri, USA
The Advanced Encryption Standard algorithm (AES - derived from the R
er, which was a finalist for NIST's Advanced Encryption Standard competition (with Bruce Schneier, J
to the development process for the Advanced Encryption Standard (AES)."
Advanced Encryption Standard (AES) was established by National I
ipher which was a candidate for the Advanced Encryption Standard, and he is one of the designers of
gn of LOKI and the cryptanalysis of the Data Encryption Standard.
hat two advanced features, disk-spanning and encryption, still require PKZIP.
dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and l
TLS, OpenPGP and end-to-end encryption support (OpenPGP not available under Windows
Compression and Encryption Support.
It was revealed that the Xtraview Encryption System used to encrypt Red Hot could be bypa
SecureIM is an encryption system built into the Trillian Instant Messe
This encryption system was discontinued by the mid-1990s in
t was the first open source transparent disk encryption system to support Windows Vista and PDAs.
ng several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard e
If two parties use an encryption system, which encrypts a message M of length
Most disk encryption systems overwrite their cached encryption ke
1960s-era encryption systems often included a punched card reader
er Areas, and A Discussion About Modern Disk Encryption Systems.
plained that once the extension and filename encryption tables are known, restoration is possible.
Encryption technologies
8 contained sophisticated communications and encryption technology, and because portions of the debr
wer trace from a smart card performing a DES encryption, the sixteen rounds can be seen clearly.
novated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window Sy
ration, such as XTS, LRW and ESSIV (see disk encryption theory), in order to avoid watermarking atta
f who downloads or shares files, with strong encryption to resist traffic sniffing.
For coding for DRGs first encryption to the valid version of the ICD-10-GM is (cu
tions, keeps no logs and uses military-grade encryption to protect sources and other confidential in
, which uses cloud computing and 128-bit SSL encryption to enable users to send and receive large da
DirecTV transmits programming with encryption to mitigate signal piracy.
Some users of GmailFS use filesystem-level encryption to protect the information they store with i
GnuPG: the core; this is the actual encryption tool
les comprise logging functionality, Blowfish encryption, user and channel management, away functiona
ate, then uses this state to perform a block encryption using part of the key, and uses the result o
FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encry
In addition the encryption using the AES 128 standard has been introduc
er's logon secrets, or in the case of system encryption, using the system's domain authentication se
Optional archive encryption using AES (Advanced Encryption Standard) wit
End-to-end encryption using a combination of Blowfish and RSA algo
upports a unique type of system for wireless encryption using the powerful wpa supplicant.
esented in the paper Fast Hashing and Stream Encryption with PANAMA on the Fast Software Encryption
I, and cloud storage), data compression, and encryption, with specific support for Microsoft SharePo
GPG Encryption with Kryptonite plugin
communication encryption with AES, serpent, CAST-256, IDEA or Blowfis
Instant messaging encryption with Off-the-Record Messaging
CLEARAID automatically reversed the encryption without having to contact the extortionist.
it was first presented at the Fast Software Encryption workshop in Leuven in 1994, and first publis
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS