Crypto-1

Results: 298



#Item
261Cryptographic hash functions / Key management / Cryptography standards / HMAC / FIPS 140-2 / Zeroisation / SHA-2 / SHA-1 / Key size / Cryptography / Error detection and correction / Cryptographic software

1B - Crypto-C ME Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
262Cryptographic hash functions / FIPS 140-2 / HMAC / FIPS 140 / SHA-1 / Advanced Encryption Standard / Crypto++ / CryptGenRandom / Cryptography / Cryptography standards / Cryptographic software

SBGSE1_SecurityPolicyPalm-_9-30-03_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
263Cryptographic hash functions / FIPS 140 / SHA-2 / Authentication / SHA-1 / Crypto++ / Cryptography / Cryptography standards / Computer security

Microsoft Word[removed]Sony_Gemini_v2-Security Policy_v103_20140324.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-23 13:28:41
264FIPS 140-2 / Public-key cryptography / National Security Agency / Cryptography / Fortezza / Smart card

Security Policy for FORTEZZA Crypto Card Version 1.1a January 16, 1997

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
265Cryptographic hash functions / Cryptography standards / Key Wrap / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / BeeCrypt / Crypto++ / Cryptography / Cryptographic software / Hashing

Cryptographic Key Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-06 08:47:36
266Advanced Encryption Standard / FIPS 140 / Key Wrap / Public-key cryptography / SHA-1 / Key / Crypto++ / CRYPTREC / Cryptography / Cryptography standards / Cryptographic software

NIST and US Civilian Agency Cryptography Matthew Scholl Group Manager, Computer Security Division, ITL, NIST Agenda:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-05-11 01:00:00
267Advanced Encryption Standard / FIPS 140 / Key Wrap / Public-key cryptography / SHA-1 / Key / Crypto++ / CRYPTREC / Cryptography / Cryptography standards / Cryptographic software

NIST and US Civilian Agency Cryptography Matthew Scholl Group Manager, Computer Security Division, ITL, NIST Agenda:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-13 01:00:00
268Message authentication codes / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / FIPS 140 / Key size / Cryptographic Module Validation Program / SHA-1 / HMAC / Cryptography / Cryptography standards / Error detection and correction

RSA BSAFEĀ® Crypto-C Micro Edition[removed]FIPS[removed]Validation Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
269Software / Internet privacy / Network architecture / Crypto-anarchism / Virtual private network / Shared resource / Windows Explorer / Computing / Computer network security / System software

Remote VPN: Remote access for personal devices Documentation Team. March[removed]About Remote VPN Remote VPN 1 provides staff and students with secure, authenticated remote access to personal and shared network filespace a

Add to Reading List

Source URL: www.abdn.ac.uk

Language: English - Date: 2014-01-21 12:49:00
270Cipher / SHA-1 / Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Cryptography / Mathematical sciences / Science

Draft revision: 3f5ad4f[removed]:38:47 +0200) Pepi Zawodsky Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, U

Add to Reading List

Source URL: bettercrypto.org

Language: English - Date: 2014-06-21 11:07:34
UPDATE