<--- Back to Details
First PageDocument Content
Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code
Date: 2016-05-26 13:27:36
Cryptography
Message authentication codes
Cryptography standards
Cryptographic software
Cryptographic hash functions
Hashing
Digital Signature Algorithm
FIPS 140-2
Dual EC DRBG
OpenSSL
SHA-2
Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 250,47 KB

Share Document on Facebook

Similar Documents

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

DocID: 1ujwj - View Document

Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

DocID: 1sMuZ - View Document

Cryptography / Notary / Professional certification / Standards / Public key certificate

COMMONWEALTH OF VIRGINIA Department of Small Business and Supplier Diversity Virginia Employment Service Organization Certification Application Organization Name: Address:

DocID: 1rugH - View Document

Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

DocID: 1rrG7 - View Document

Cryptography / Turing Award laureates / Whitfield Diffie / Phillip Rogaway / Martin Hellman / Joseph Rotblat / National Institute of Standards and Technology / David Chaum / Cypherpunk

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

DocID: 1rqKX - View Document