АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ E-coinE-money double spending problemE-votingE-wallet, walletEfficiency, effectivenessEgress filteringEl Gamal digital signature schemeElection scheme, voting scheme, voting protocolElectronic cash system, e-cash systemElectronic dataElectronic data interchangeElectronic data interchange (EDI)Electronic funds transfer (EFT)Electronic messageElectronic messageElectronic money, e-moneyElectronic passportElectronic payment systemElectronic signatureElectronic signature facility certificateElectronic signature key, signature creation dataEmbedded cryptographic systemEnciphering keyEncodingEncoding moduleEncryption algorithmEncryption algorithmEncryption functionEncryption functionEncryption method (cipher type)Encryption modeEncryption moduleEncryption, encipheringEncryption, enciphermentEnd userEnd-point encryptionEndpointEndpoint detection and response (EDR)Enrolment attemptEnrolment transactionEnterprise information systemEntityEntity authenticationEntity authentication cryptosystemEntity resolution and analysis (ER&A)Environmental metricsEquivalent keysEquivalent keys attackEquivalent keys cryptanalysisEscrowed encryption standard (EES)Establishing the contextEthical hackingEthical hackingEvaluationEvaluationEvaluation assurance levelEvaluation authorityEventExchange multiplicity parameterExecutable formExhaustive key search, brute-force attackExhaustive search method, brute-force attackExistential forgeryExperimenterExpert systemExplainabilityExplicit key authenticationExplicit key authentication from entity A to entity BExploitExploratory data analysis (EDA)ExposureExtended detection and response (XDR)