Crypto-1

Results: 298



#Item
241Electronic commerce / Key size / HMAC / Whitfield Diffie / DES-X / SHA-1 / RSA / Zeroisation / Crypto++ / Cryptography / Key management / Cryptographic software

RSA BSAFE Crypto-J[removed]Security Policy JCE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
242Computer security / Cryptography standards / Microsoft CryptoAPI / FIPS 140-2 / Cryptographic Service Provider / FIPS 140 / SHA-1 / CryptGenRandom / Crypto++ / Cryptography / Cryptographic software / Computing

Microsoft Word - 01o - TC-SecPol-27.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
243FIPS 140-2 / Critical Security Parameter / Over the Air Rekeying / FIPS 140 / Zeroisation / National Security Agency / Crypto++ / Microsoft CryptoAPI / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 9a - Security Policy ver2.1.1_1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-01-25 12:17:12
244Electoral systems / Elections / Information society / Scantegrity / ThreeBallot / Help America Vote Act / Prêt à Voter / Invisible ink / Voting system / Politics / Election technology / Electronic voting

End-to-end crypto works. Now what? Dan S. Wallach, Rice University 1 Introduction

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2010-02-26 16:09:05
245Water pollution / Water supply and sanitation in the United States / Water industry / Water management / Safe Drinking Water Act / Drinking water / Water supply network / Public water system / Bottled water / Water / Environment / Soft matter

Drinking Water News For America’s Small Communities Spring1996 Volume 5, Issue 1 Tales from the Crypto:

Add to Reading List

Source URL: www.nesc.wvu.edu

Language: English - Date: 2001-04-18 13:33:00
246Electronic engineering / Digital electronics / Computer storage / Cryptography / Data security / Tamper resistance / Static random-access memory / Random-access memory / Computer data storage / Computer memory / Computer hardware / Computing

On a New Way to Read Data from Memory David Samyde1 , Sergei Skorobogatov2 , Ross Anderson2 and Jean-Jacques Quisquater1 1: Universit´e catholique de Louvain, UCL Crypto Group Place du Levant, 3, B-1348 Louvain-la-Neuve

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-26 11:13:35
247Ubiquitous computing / Electronic engineering / Telecommunications engineering / Wireless / Near field communication / Radio-frequency identification / NXP Semiconductors / Crypto-1 / ISO/IEC 14443 / ISO standards / Technology / MIFARE

AN1305 MIFARE Classic as NFC Type MIFARE Classic Tag Rev. 1.2 — 3 May[removed]Application note

Add to Reading List

Source URL: dangerousthings.com

Language: English - Date: 2012-08-25 12:30:01
248Vaccines / Microbiology / Moraxellaceae / Zoonoses / Animal virology / Influenza vaccine / Influenza / Acinetobacter / Notifiable disease / Medicine / Health / Biology

CRYPTO ALERT : INCREASING REPORTS OF CRYPTO CASES AND OUTBREAKS[removed]ISS UE 1 VOLUM E 1

Add to Reading List

Source URL: health.tn.gov

Language: English - Date: 2008-07-24 14:40:07
249FIPS 140-2 / Digital Signature Algorithm / National Security Agency / SHA-1 / Capstone / NSA cryptography / Cryptography / Public-key cryptography / Fortezza

Pages: 22 TITLE: Security Policy for FORTEZZA Crypto Card DATE: May 5, 1997

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
250Cryptography standards / Electronic commerce / Key size / HMAC / DES-X / Whitfield Diffie / SHA-1 / RSA / Zeroisation / Cryptography / Key management / Cryptographic software

RSA BSAFE Crypto-J[removed]Security Policy JSAFE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE