АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Latin squareLattice-based cryptographyLeast privilegeLegal userLevel of riskLicenseLife cycleLife cycle of application serviceLightweight cryptographyLikelihoodLinear attackLinear complexity profile testLoad balancingLocal area networkLogic bombLogical key hierarchyLong-term key, static keyLoophole