Results for uc translation from Persian to English

Human contributions

From professional translators, enterprises, web pages and freely available translation repositories.

Add a translation

Persian

English

Info

Persian

uc

English

uc

Last Update: 2014-10-18
Usage Frequency: 1
Quality:

Reference: Wikipedia

Persian

توزیع‌های بلند مدت آن همچنین از پروؤه‌های سان مایکروسیستمز و uc berkeley daedelus و carnegie mellon monarch نیز می‌آمدند.

English

long-running contributions have also come from sun microsystems, the uc berkeley daedelus, and carnegie mellon monarch projects it used.

Last Update: 2016-03-03
Usage Frequency: 1
Quality:

Reference: Wikipedia

Persian

او درخواست پذیرش از دانشگاه سانتاکلارا (santa clara) کرد و از مدرسه uc در شهر سن دیگو در رشته پزشکی فارغ‌التحصیل شد.

English

the following year, he entered the university of california, san diego, school of medicine, where he earned his m.d.

Last Update: 2016-03-03
Usage Frequency: 1
Quality:

Reference: Wikipedia

Persian

":* typex –:* jn-25 –:* naval cypher 3 –مقاله اصلی _ رمزنگاری کلید عمومی:* ace-kem – nessie::* ace encrypt –:* chor-rivest –:* پروتکل تبادل کلید دیفی-هلمن – cryptrec:* رمزنگاری منحنی بیضوی –:* psec-kem – nessie : ntt (japan); cryptrec::* ecies –::* ecies-kem –::* ecdh – cryptrec:* epoc –:* mceliece –:* niederreiter cryptosystem –:* آراس‌ای –::* rsa-kem – nessie::* rsa-oaep – cryptrec:* rabin cryptosystem –::* rabin-saep –::* hime(r) –:* threshold cryptosystem –:* xtr –مقاله اصلی _کلید رمزمقاله اصلی _ key authentication:* x.509 –:* مرجع صدور گواهی دیجیتال –:* certificate revocation list –* id-based cryptography –* certificate-based encryption –* secure key issuing cryptography –* certificateless cryptography –حمل و نقل / تبادل* حمله مرد میانی –* needham–schroeder –* offline private key –* otway–rees –* trusted paper key –* wide mouth frog –مقاله اصلی _weak key* حمله لغت‌نامه‌ای –* related key attack –* key derivation function –* key strengthening –* password-authenticated key agreement –* passphrase –* salt –مقاله اصلی _تابع درهم‌سازی رمزنگارانه* کد اصالت‌سنجی پیام برپایه درهم‌سازی –:* emac – nessie selection mac:* کد اصالت‌سنجی پیام برپایه درهم‌ساز – nessie selection mac; iso/iec 9797-1, fips pub 113 and ietf rfc:* ttmac – (two-track-mac) nessie selection mac; k.u.leuven (belgium) & debis ag (germany):* umac – nessie selection mac; intel, unevada reno, ibm, technion, & uc davis* ام‌دی۵ – یکی از سری الگوریتم های هضم پیام توسط پروفسور ron rivest of mit; 128 bit digest* sha-1 – توسعه یافته توسط nsa;:* sha-256 – nessie تابع هش انتخابی, fips 180-2, 256 bit digest; cryptrec:* اس‌اچ‌ای-۲ – nessie تابع هش انتخابی, fips 180-2, 384 bit digest; cryptrec:* sha-512 – nessie تابع هش انتخابی, fips 180-2, 512 bit digest; cryptrec* ripemd-160 – در اروپا ripe توسعه پروژه , 160-bit digest;cryptrec* tiger – توسط ross anderson "et al.

English

":* typex – wwii uk cypher machine*hybrid code/cypher combinations:* jn-25 – wwii japanese navy superencyphered code; many variants:* naval cypher 3 – superencrypted code used by the royal navy in the 30s and into wwiiasymmetric key algorithms:* ace-kem – nessie selection asymmetric encryption scheme; ibm zurich research)::* ace encrypt –:* chor-rivest –:* diffie-hellman – key agreement; cryptrec recommendation:* el gamal – discrete logarithm:* elliptic curve cryptography – (discrete logarithm variant:* psec-kem – nessie selection asymmetric encryption scheme; ntt (japan); cryptrec recommendation only in dem construction w/sec1 parameters::* ecies – "elliptic curve integrated encryption system", certicom corporation::* ecies-kem –::* ecdh – "elliptic curve diffie-hellman key agreement", cryptrec recommendation:* epoc –:* merkle–hellman knapsack cryptosystem – knapsack scheme:* mceliece –:* niederreiter cryptosystem –:* ntruencrypt –:* rsa – factoring::* rsa-kem – nessie selection asymmetric encryption scheme; iso/iec 18033-2 draft::* rsa-oaep – cryptrec recommendation:* rabin cryptosystem – factoring::* rabin-saep –::* hime(r) –:* threshold cryptosystem –:* xtr –==keys==authentication* public key infrastructure –:* x.509 –* public key certificate –:* certificate authority –:* certificate revocation list –* id-based cryptography –* certificate-based encryption –* secure key issuing cryptography –* certificateless cryptography –* merkle tree –transport/exchange* diffie–hellman –* man-in-the-middle attack –* needham–schroeder –* offline private key –* otway–rees –* trusted paper key –* wide mouth frog –weak keys* brute force attack –* dictionary attack –* related key attack –* key derivation function –* key strengthening –* password –* password-authenticated key agreement –* passphrase –* salt –==cryptographic hash functions==* message authentication code –* keyed-hash message authentication code –:* emac – nessie selection mac:* hmac – nessie selection mac; iso/iec 9797-1, fips pub 113 and ietf rfc:* ttmac – (two-track-mac) nessie selection mac; k.u.leuven (belgium) & debis ag (germany):* umac – nessie selection mac; intel, unevada reno, ibm, technion, & uc davis* md5 – one of a series of message digest algorithms by prof ron rivest of mit; 128 bit digest* sha-1 – developed at nsa 160-bit digest, an fips standard; the first released version was defective and replaced by this; nist/nsa have released several variants with longer 'digest' lengths; cryptrec recommendation (limited):* sha-256 – nessie selection hash function, fips 180-2, 256 bit digest; cryptrec recommendation:* sha-384 – nessie selection hash function, fips 180-2, 384 bit digest; cryptrec recommendation:* sha-512 – nessie selection hash function, fips 180-2, 512 bit digest; cryptrec recommendation* sha-3 – originally known as keccak; was the winner of the nist hash function competition using sponge function.

Last Update: 2016-03-03
Usage Frequency: 1
Quality:

Reference: Wikipedia
Warning: Contains invisible HTML formatting

Get a better translation with
8,728,505,930 human contributions

Users are now asking for help:



We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. Learn more. OK