Russian | English |
алгоритм цифровой подписи на основе эллиптических кривых | elliptic curve digital signature algorithm (operates on elliptic curve groups Rori) |
кривая Безье | Bezier curve (A curve that is calculated mathematically to connect separate points into smooth, free-form curves and surfaces of the type needed for illustration programs and CAD models. Bezier curves need only a few control points to define a large number of shapes–hence their usefulness over other mathematical methods for approximating a given shape) |
Кривая Безье третьего порядка | cubic Bezier curve |
кривая Безье третьего порядка | cubic Bezier curve (A curve described by two endpoints and two control points) |
кривые воспроизведения полутонов | TRC (An algorithm for colour reproduction that maps a set of in-put tones to a set of output tones and is used to control how a device reacts to different light intensities in the visible colour spectrum) |
кривые воспроизведения полутонов | tone reproduction curve (An algorithm for colour reproduction that maps a set of in-put tones to a set of output tones and is used to control how a device reacts to different light intensities in the visible colour spectrum) |
свободная кривая | freeform curve (A curved line, made up of segments and defined by control points) |
шифрование на основе эллиптических кривых | elliptic curve cryptography (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases) |
эллиптическая кривая Диффи-Хелмана | elliptic curve Diffie-Hellman (Pertaining to a key agreement protocol which enables two users to create a shared secret agreement over a nonsecure, public medium, using elliptic curve cryptography without having previously exchanged any private information using. It is based on the Diffie–Hellman protocol) |