Subject | English | Latvian |
comp., MS | asymmetric key algorithm | asimetrisko atslēgu algoritms (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
tech., law, el. | continuous trading matching algorithm | nepārtrauktas tirgus sasaistīšanas algoritms |
comp., MS | hash algorithm | jaucējalgoritms (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
tech., law, el. | price coupling algorithm | cenas sasaistīšanas algoritms |
comp., MS | Secure Hash Algorithm 1 | drošais jaukšanas algoritms 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |