Subject | Slovene | English |
math. | algoritem EM | estimation-maximization algorithm |
math. | algoritem EM | EM algorithm |
math. | algoritem EM | estimation-maximisation algorithm |
comp., MS | asimetrični algoritem | asymmetric algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
math. | ocenjevanje-maksimiranje algoritem | EM algorithm |
math. | ocenjevanje-maksimiranje algoritem | estimation-maximization algorithm |
math. | ocenjevanje-maksimiranje algoritem | estimation-maximisation algorithm |
math. | podatki bogatenja algoritem | data augmentation algorithm |
comp., MS | razpršilni algoritem | hash function (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
comp., MS | razpršilni algoritem | hash algorithm (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
comp., MS | razpršilni algoritem MD5 | MD5 (An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication) |
math. | self-doslednost Efron's algoritem | missing information principle |
math. | self-doslednost Efron's algoritem | Efron's self-consistency algorithm |
comp., MS | šifrirni algoritem AES | Advanced Encryption Standard (A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information) |
comp., MS | šifrirni algoritem DES | Data Encryption Standard (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key) |