Cryptography standards

Results: 2254



#Item
71Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
72Cryptography / Standards organizations / BSI Group / International Electrotechnical Commission / Public key certificate

Certificate of Registration SPOTLESS FOOD SAFETY STANDARD FOR SUPPLIERS This is to certify that: Parmalat Australia Pty Ltd Manufacturing

Add to Reading List

Source URL: www.parmalat.com.au

Language: English - Date: 2015-11-29 18:32:12
73Cryptography / Cryptography standards / Signature / Computer law / Standards organizations / Records management technology / PAdES / XAdES / ETSI / Trust service provider / CAdES / Electronic Signatures Directive

TRV1Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures: overview

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2016-04-25 08:12:22
74Information privacy / Economy / Payment cards / Business / Computing / E-commerce / Peripheral Component Interconnect / Cryptography / Hardware security module / Payment Card Industry Data Security Standard / Tokenization / Qualified Security Assessor

Media Contact Laura K. Johnson PCI Security Standards Council Twitter @PCISSC

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-06-16 21:26:42
75Cryptography / Project 25 / Data Encryption Standard / Advanced Encryption Standard / Cryptographic software / Block ciphers / Disk encryption / NSA encryption systems / FASCINATOR

The Use of ADP Encryption in Federal Grant Funded Programs Author: John Oblak EF Johnson Technologies Vice President of Standards and Regulatory Affairs Chair TIA TR-8 Committee on Mobile and Personal Private Radio Stand

Add to Reading List

Source URL: www.efjohnson.com

Language: English - Date: 2011-08-21 12:33:27
76Internet / Computing / Internet protocols / Cryptography / Internet Standards / Domain name system / DNSSEC / Domain Name System Security Extensions / Key management / DNS spoofing / Telephone number mapping / SIP URI scheme

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
77Abstract algebra / Algebra / Elliptic curve cryptography / Finite fields / Public-key cryptography / Group theory / Elliptic curve / Complex multiplication

Standards for Efficient Cryptography SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
78Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
79Security / ISO standards / Computer security / Computing / Computer access control / E-commerce / Cryptography / National security / Subscriber identity module / Smart card / Common Criteria / EMV

General SIM Security Guidelines June 2013 Securing the future of mobile services

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-03-26 18:46:30
80Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-26 14:51:24
UPDATE