Crypto-1

Results: 298



#Item
221Cryptographic software / HMAC / Hashing / FIPS 140 / Advanced Encryption Standard / Cisco IOS / Cisco Systems / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Computing

Microsoft Word - IC2M Security Policy_rel(1.5).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-15 15:13:53
222Instruction set architectures / Integrated development environments / Cross-platform software / X86 architecture / X86-64 / Cryptographic software / 64-bit / Itanium / Windows Server / Software / Computing / Computer architecture

RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy Level 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-05 14:57:55
223Internet protocols / Data / Secure communication / Hashing / Cryptographic hash functions / HMAC / IPsec / Cipher suite / SHA-1 / Cryptography / Cryptographic protocols / Computing

Microsoft Word - 8e - 4x_RFS7K_Crypto_Module_Security_Policy R1.2.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 16:11:46
224Integrated development environments / Instruction set architectures / Cryptographic software / Cross-platform software / X86 architecture / X86-64 / 64-bit / Microsoft Visual Studio / Itanium / Software / Computing / Computer architecture

RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy Level 1 with Level 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-05 15:56:07
225Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Bruce Schneier / Cryptography / Cipher / SHA-1

Draft revision: ea089c8[removed]:11:44 +0100) Aaron Kaplan Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ul

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
226Vaccines / Microbiology / Moraxellaceae / Zoonoses / Animal virology / Influenza vaccine / Influenza / Acinetobacter / Notifiable disease / Medicine / Health / Biology

CRYPTO ALERT : INCREASING REPORTS OF CRYPTO CASES AND OUTBREAKS[removed]ISS UE 1 VOLUM E 1

Add to Reading List

Source URL: health.state.tn.us

Language: English - Date: 2008-07-24 14:40:07
227Cryptographic hash functions / FIPS 140 / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / MD5 / Crypto++ / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - 800b - AQ42-M-Security Policy_v100_draft_140813.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-12 18:31:20
228FIPS 140-2 / PBKDF2 / Advanced Encryption Standard / Zeroisation / FIPS 140 / Crypto++ / Microsoft CryptoAPI / Cryptography / Cryptography standards / HMAC

Cryptographic Module for CipherCloud Gateway Version 1.0 FIPS[removed]Level 1 Security Policy Version Number: 1.8 Date: August 14, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-18 14:40:42
229A5/1 / Keystream / Cipher / Digital signal processor / QUAD / Symmetric-key algorithm / Key size / Linear feedback shift register / Cryptography / Stream ciphers / Pseudorandom number generators

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz Horst-Goertz Institute for IT Security Ruhr-University Bochum, Ger

Add to Reading List

Source URL: gmr.crypto.rub.de

Language: English - Date: 2012-02-07 10:58:42
230Internet privacy / Virtual private network / ActiveX / Computing / Computer network security / Network architecture / Crypto-anarchism

Troubleshooting: Viewing the Electronic  Student Folder in Webcat  1. Question:  I clicked the “Display Document” link, but all I get is an message saying that the page cannot be  display

Add to Reading List

Source URL: www.unh.edu

Language: English - Date: 2013-08-16 16:16:11
UPDATE