Akademik

key
1) (криптографический) ключ
2) ключ к замку или запирающему устройству , механический ключ
3) клавиша клавиатуры
- change a key
- derive a key
- determine key
- discard the key
- download the key
- encrypt in key
- secret key
- guess the key
- identify the key
- install the key
- insert the key
- load the key
- memorize the key
- recreate the key
- reload the key
- share key
- verify the key
- key of directory
- key of unlimited length
- access key
- access control key
- activation key
- active key
- actual key
- actually-used key
- additional key
- agreed-upon key
- alpha-numeric key
- alterable key
- ancestor key
- appropriate key
- arbitrary key
- arbitrarily chosen key
- ascending key
- asymmetric key
- asymmetrical public key
- authentication key
- authorized key
- auto-session key
- base key
- bidirectional key
- bilateral key
- binary key
- block key
- built-in key
- hutch key
- candidate key
- card key
- center key
- centrally produced key
- certificated key
- chained key
- concatenated key
- changeable key
- charge key
- children key
- cipher key
- classified key
- clear key
- clear cryptographic key
- code key
- combiner key
- command key
- common key
- communication key
- complementary key
- complex key
- compromised key
- computer key
- concatenated key
- conference key
- controlling key
- conventional cryptographic key
- conversation key
- conversion key
- copied key
- correct key
- corrupted key
- courier delivered key
- cross-domain key
- cross-realm key
- cryptographic key
- cryptoignition key
- cryptologically secure key
- current key
- custom key
- customer specific key
- daily key
- data key
- data authentication key
- database key
- data-dependent key
- data enciphering key
- data encrypting key
- data encryption key
- data-operation key
- data privacy key
- data-translation key
- decode key
- decrypt only key
- derived key
- DES key
- descrambling key
- destination key
- device key
- device master key
- digital key
- discoverable key
- distribution key
- document key
- double key
- double length key
- downline-loaded key
- dynamically changed key
- electronic key
- electronically generated key
- electronically transferring key
- elementary key
- emergency key
- encryption key
- encashed key
- enciphered key
- encoding key
- encrypted key
- encryption key
- encryption/decryption key
- encrypt only key
- end-to-end encryption key
- entropic key
- equipment key
- erase key
- error key
- exchanged key
- expanded key
- explicit key
- exponentially derived key
- extended key
- external key
- externally loaded key
- externally supplied key
- extra key
- factory installed key
- factory programmed key
- fake key
- false key
- family key
- file key
- file security key
- finite key
- fixed length key
- freely selected key
- function key
- generic key
- genuine key
- global key
- good key
- group key
- guard key
- hand-delivered key
- hard copy key
- hardware key
- hardware-based key
- hex key
- hexadecimal key
- hidden key
- high-security key
- host key
- host master key
- house key
- identifier key
- identity key
- individually numbered key
- inherent key
- initial key
- inserted key
- installed key
- interchange key
- intermediate key
- internal key
- internally generated key
- inter-user key
- Inverse key
- issuer's key
- keyboard key
- key-encrypting key
- key encryption key
- key interchange key
- letter key
- limited key
- link key
- link encryption key
- literal key
- local key
- locally assigned key
- long-lived key
- long-term key
- lost key
- major key
- manufacturer-installed key
- manufacturer's key
- master key
- matching key
- mechanical key
- memorized key
- message key
- mnemonic key
- modified one-time key
- modifier key
- module security key
- mutual cipher key
- named key
- native key
- negotiated key
- network key
- node key
- non-linear key
- non-recallable key
- non-repeating key
- non-volatile key
- notarized public key
- numeric key
- numerical key
- one-time key
- one-way key
- one-word key
- operation key
- operational key
- original key
- originator's key
- out-of-date key
- owner key
- pairwise key
- paper-tape key
- parity-protected key
- pass key
- password-protected key
- pending key
- per-call key
- per-connection key
- perfectly random key
- periodic key
- permanent key
- per-session key
- personal key
- personal identification key
- physical key
- physical key for power-on
- polyalphabetic key
- polynomial derived key
- poorly selected key
- prearranged key
- predetermined key
- pre-loaded key
- primary key
- priming key
- printable key
- privacy key
- private key
- private session key
- PRN key
- pseudorandom number key
- probable key
- program-controlled key
- proper key
- protected key
- protection key
- proved key
- pseudo-key
- pseudorandom key
- public key
- public encrypting key
- publicly revealed key
- published encryption key
- punch card key
- purchased key
- random key
- randomly chosen key
- randomly generated key
- randomly selected key
- read back key
- reassigned key
- receiver's key
- recipient's key
- record key
- related key
- remaining key
- remote key
- repeating key
- reserve key
- resident terminal key
- retired key
- revealed key
- rolling key
- round key
- RSA public key
- running key
- safe key
- scrambling key
- search key
- searched key
- second key
- secondary key
- secret key
- secret decrypting key
- security key
- seed key
- selected key
- semi-weak key
- sequencing key
- service key
- session key
- shared key
- shared common key
- short-term key
- signature key
- signature authentication key
- signature generation key
- signing key
- single key
- single length key
- size-limited key
- slave key
- small key
- software key
- source key
- spare key
- specific key
- split key
- standardized key
- standby key
- static key
- station key
- storage key
- storage protection key
- strong key
- subordinate key
- substitution key
- super-increasing key
- switch-selectable key
- symmetric key
- symmetrical private key
- system key
- system access key
- system generated key
- system master key
- system-protected key
- system session key
- tagged key
- tag-protected key
- temporary key
- terminal key
- terminal-level key
- test key
- third-party key
- time-expired key
- time-variant key
- top-level key
- totally random key
- traffic key
- traffic encryption key
- transaction key
- transformation key
- transient key
- transmitter's key
- transport key
- trial key
- true key
- two-part key
- two-way key
- unbreakable key
- unchangable key
- uncompromised key
- unduplicatable key
- universal key
- universally accessible key
- unknown key
- unpredictable key
- unpublished key
- unreadable key
- untampered key
- updated key
- used key
- user key
- user-assigned key
- user-authorized key
- user-defined key
- user-entered key
- user-level key
- user programmable structure key
- user-scooted key
- user's personal key
- variable-length key
- verification key
- weak key
- work key
- working key
- wrong key
- wrongly entered key
- zonal key
- zone key

Англо-русский словарь по компьютерной безопасности. . 2011.