Cryptography standards

Results: 2254



#Item
911European Telecommunications Standards Institute / Cryptography standards / Dedicated short-range communications / Electronics / 3GPP / Digital Enhanced Cordless Telecommunications / ETSI Satellite Digital Radio / Lawful interception / Standards organizations / Technology / Electronic engineering

EN[removed]V1[removed]Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-11-28 10:31:33
912Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
913Randomness / Block cipher / Pseudorandomness / National Institute of Standards and Technology / Federal Information Security Management Act / Cryptographic hash function / Random number generation / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Pseudorandom number generators / Applied mathematics

The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 17:22:13
914NIST / Cryptography standards / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

CNST NanoFab Facilities Use Agreement Instructions - Example Page The Facilities Use Agreement (FUA) must be signed by someone with signature authority for your organization. Once agreement has been completed and signed

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-10-24 17:19:28
915Cryptographic protocols / Internet protocols / Internet standards / Public key certificate / Certificate policy / Online Certificate Status Protocol / HTTP Secure / Digital signature / X.509 / Cryptography / Public-key cryptography / Key management

IGC BASIC SOFTWARE UNAFFILIATED CERTIFICATE SUBSCRIBER AGREEMENT This IGC Basic Software Unaffiliated Certificate Subscriber Agreement (this “Agreement”) is made by and between IdenTrust (defined below) and You (defi

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
916Cryptographic protocols / Internet protocols / Internet standards / Public key certificate / Certificate policy / Online Certificate Status Protocol / HTTP Secure / Digital signature / Revocation list / Cryptography / Public-key cryptography / Key management

IGC MEDIUM SOFTWARE CERTIFICATE SUBSCRIBER AGREEMENT This IGC Medium Software Certificate Subscriber Agreement (this “Agreement”) is made by and among IdenTrust (defined below) on the one hand, and You (defined below

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
917Cryptographic protocols / Internet protocols / Internet standards / Public key certificate / Certificate policy / Online Certificate Status Protocol / HTTP Secure / Revocation list / Cryptography / Public-key cryptography / Key management

IGC MEDIUM DEVICE CERTIFICATE SUBSCRIBER AGREEMENT This IGC Medium Device Certificate Subscriber Agreement (this “Agreement”) is made by and among IdenTrust (defined below) on the one hand, and You (defined below) an

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
918Science / Cryptographic protocols / Secure communication / Computer network security / Internet / Cryptography / Internet standards / Computing

August 5, 2014 To Whom It May Concern: Aspect Security, Inc. was engaged by Wickr to conduct an Application Security Assessment of the Wickr iOS, Android, Desktop Client, and Server applications in July, 2014.

Add to Reading List

Source URL: www.wickr.com

Language: English - Date: 2014-08-08 13:33:52
919Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / Public key certificate / Online Certificate Status Protocol / HTTP Secure / Digital signature / X.509 / Cryptography / Public-key cryptography / Key management

IGC BASIC HARDWARE UNAFFILIATED CERTIFICATE SUBSCRIBER AGREEMENT This IGC Basic Hardware Unaffiliated Certificate Subscriber Agreement (this “Agreement”) is made by and between IdenTrust (defined below) and You (defi

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-06-26 18:27:22
920Security / Computer security / Cryptography / Password cracking / Password / Computer crimes / Cyber-bullying

Cyberbullying: Broken Friendship 1 GRADE MS LESSON 2 Time Required: 30 minutes Content Standards: [removed]Standard 9: Students will understand safety and survival skills. Indicators (Students will…): Students will learn

Add to Reading List

Source URL: wvde.state.wv.us

Language: English - Date: 2009-11-10 13:51:20
UPDATE