DictionaryForumContacts

Terms containing algoritmus | all forms | exact matches only
SubjectCzechEnglish
comp., MSalgoritmus asymetrických klíčůasymmetric key algorithm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSalgoritmus DESDES (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key)
comp., MSalgoritmus 3DESTriple DES An encryption algorithm based on the Data Encryption Standard (DES) (Triple DES)
comp., MSalgoritmus 3DES3DES (An encryption algorithm based on the Data Encryption Standard (DES))
comp., MSalgoritmus 3DESTriple Data Encryption Standard An encryption algorithm based on the Data Encryption Standard (DES) (Triple Data Encryption Standard)
comp., MSalgoritmus DESData Encryption Standard An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key (Data Encryption Standard)
comp., MSalgoritmus DSADSA (The U.S. government standard for digital signatures, as specified by the National Institute of Standards and Technology, in FIPS 186, Digital Signature Standard. DSA is based on signature encryption based on a public and a private key)
comp., MSalgoritmus hashhash algorithm (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
comp., MSalgoritmus MACMAC (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received)
comp., MSalgoritmus MD5MD5 (An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication)
comp., MSalgoritmus Microsoft Sequence ClusteringMicrosoft Sequence Clustering algorithm (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics)
comp., MSalgoritmus Microsoft Time SeriesMicrosoft Time Series algorithm (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps)
comp., MSalgoritmus SHA-1SHA-1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places)
comp., MSalgoritmus SHA-1Secure Hash Algorithm 1 An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places (Secure Hash Algorithm)
comp., MSalgoritmus veřejného klíčepublic key algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSasymetrický algoritmusasymmetric algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSdělení podle algoritmu hashhash partitioning (A way of partitioning a table or index by allowing SQL Server to apply an internal hash algorithm to spread rows across partitions based on the number of partitions specified and the values of one or more partitioning columns)
comp., MSkryptografický algoritmuscryptographic algorithm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
construct.univerzální algoritmusuniversal algorithm
automat.zpracování algoritmualgorithm performance

Get short URL