Cryptography standards

Results: 2254



#Item
951Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:38:26
952Cryptographic protocols / FIPS 140-2 / FIPS 140 / Password / SHA-2 / X.509 / Secure communication / Cryptography / Cryptography standards / Computer security

Microsoft Word - 216g - Dell SonicWALL SRA EX6000-7000 SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 10:11:39
953Cryptography standards / FIPS 140 / SerDes

FIPS 140 Validation Agreement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:41:54
954Critical Security Parameter / Computing / Cyberwarfare / Cryptography standards / Computer security / FIPS 140

IBM Corporation IBM Security QRadar FIPS Appliance Hardware Part Number: QR24; Firmware Version: v7.1 MR1 FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:26:25
955Internet protocols / Secure communication / Cryptography standards / SHA-2 / HMAC / Secure Shell / Cipher suite / Key size / Key generation / Cryptography / Key management / Cryptographic hash functions

Microsoft Word - 201i - McAfee NSP V7.1 IPS-NAC SecurityPolicy v1.20.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:08:42
956Cisco Systems / FIPS 140 / Cryptographic Module Validation Program / Electronics / Evaluation / Cryptography standards / Computing / Small form-factor pluggable transceiver

Microsoft Word - ONS Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-22 14:22:28
957Tunneling protocols / Cryptographic protocols / Internet standards / Man-in-the-middle attack / Label Switched Path / Opportunistic encryption / Public-key cryptography / IPsec / Pseudo-wire / Network architecture / Computing / Cryptography

draft-farrelll-mpls-opportunistic-encrypt-00 - Opportunistic Encryption in MPLS Networks

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
958Cryptographic protocols / Email authentication / Email / Internet standards / S/MIME / X.509 / Cryptographic Message Syntax / MIME / PKCS / Cryptography / Public-key cryptography / Computing

Secure Electronic Mail: It’s Ready for Prime Time Panel Chair Russell Housley, SPYRUS Panelists John Pawling, J.G. Van Dyke & Associates Michael Elkins, Network Associates, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
959Computer security / Cryptography / Password policy / Password manager / Password / Security / Television

UYN: The Password Rap 2 GRADE 3-4 LESSON 5 Time Required: 25 minutes Content Standards: [removed]Standard 9: Students will understand safety and survival skills.

Add to Reading List

Source URL: wvde.state.wv.us

Language: English - Date: 2009-11-10 13:43:03
960Computing / Internet protocols / Secure communication / Internet standards / Password / TLS-SRP / Man-in-the-middle attack / Public-key cryptography / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Security

Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption Ben Laurie Google, Inc. Ian Goldberg

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE