АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ HackerHardwareHardware aspectsHardware encryptionHardware moduleHardware security module (HSM)Hash functionHash-code, hash-result, hash-value, hash, imprint, digital fingerprint, message digestHashing algorithmHazardHazardous eventHeteronomy, heteronomousHierarchical identity-based encryptionHierarchy of keysHierarchy type PKI architectureHigh strength of functionHomomorphic encryption systemHonest partyHonest-verifier zero-knowledgeHoney potHybrid cryptosystemHypervisor