АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ E-coinE-money double spending problemE-wallet, walletEfficiencyEgress filteringEl Gamal digital signature schemeElection scheme, voting scheme, voting protocolElectronic cash system, e-cash systemElectronic dataElectronic data interchangeElectronic data interchange (EDI)Electronic funds transfer (EFT)Electronic messageElectronic messageElectronic money, e-moneyElectronic passportElectronic payment systemElectronic signatureElectronic signature facility certificateElectronic signature key, signature creation dataEnciphering keyEncryption algorithmEncryption algorithmEncryption functionEncryption functionEncryption method (cipher type)Encryption modeEncryption, encipheringEnd-point encryptionEnterprise information systemEntityEntity authenticationEntity resolution and analysis (ER&A)Equivalent keysEquivalent keys attackEquivalent keys cryptanalysisEscrowed encryption standard (EES)Establishing the contextEthical hackingEvaluationEvaluationEvaluation assurance levelEvaluation authorityEventExhaustive key search, brute-force attackExistential forgeryExplicit key authenticationExploitExposure