Cryptography standards

Results: 2254



#Item
101Public-key cryptography / ISO standards / Ubiquitous computing / Elliptic curve cryptography / Cryptography / Key-agreement protocol / DiffieHellman key exchange / Elliptic curve DiffieHellman / Contactless smart card / Security token / Smart card / Forward secrecy

Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:53
102Cryptography standards / FIPS 140-2 / Common Criteria / FIPS 140 / Common Criteria Testing Laboratory / Cryptographic Module Testing Laboratory

Microsoft Word - Choose_Testing_Lab.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
103Cryptography / Crime prevention / Information governance / National security / Data management / Information security / Data steward / Database / Computer security

ENTERPRISE IT STANDARDS AND PROCEDURES DATA STEWARDSHIP STANDARDS Policy: Enterprise Data Stewardship Policy

Add to Reading List

Source URL: www.montana.edu

Language: English - Date: 2016-01-19 13:45:51
104Country code top-level domains / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Internet Assigned Numbers Authority / Internet Engineering Steering Group / Internet Engineering Task Force / Request for Comments

IANA Department Plenary Report Michelle Cotton | IETF-95, Buenos Aires | April 2016 Processing IETF Related Requests A look over the past 12 months (March 2015-February 2016)*

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-04-03 19:50:29
105Cryptography / Secure communication / Disk encryption / Cryptographic software / Encryption / Data Encryption Standard / Key size / Crypto phone / Secure voice / VeraCrypt / Cryptography standards

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-02-03 15:53:09
106Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / Hardware security module / SafeNet / FIPS 140 / Cisco Systems / Brocade Communications Systems / Advanced Encryption Standard / Computer security / OpenSSL / Smart card

Cryptographic Module Validation Program FIPSand FIPSModules In Process List Module Name Vendor Name

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:11
107Domain name system / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / NSD / Comparison of DNS server software / BIND / Name server / NLnet

DNSSEC software at NLnet Labs Jelte Jansen http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
108Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-08-02 22:30:34
109Computer security / Data security / Computer network security / Cryptography / National security / Security controls / Information security / National Institute of Standards and Technology / Vulnerability

Independent Security Assessment Criteria Phase – I Version 1.1, datedFor: {Organization name} Performed on: {Date of Assessment}

Add to Reading List

Source URL: www.calguard.ca.gov

Language: English - Date: 2016-07-18 16:29:13
110Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
UPDATE