Digital Signature Algorithm

Results: 127



#Item
71Key management / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Digital Signature Algorithm / Digital signature / Zeroisation / Cryptography / Public-key cryptography / Cryptography standards

Neopost, Inc[removed]Huntwood Avenue Hayward, CA[removed]FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
72Digital signature / Data Encryption Standard / Federal Information Processing Standard / RSA / FIPS 140-2 / Cryptographic hash function / Non-repudiation / Cryptography standards / CRYPTREC / Cryptography / Public-key cryptography / Digital Signature Algorithm

FIPS[removed]Change 1, Digital Signature Standard (DSS) (superseded June 9, 2009)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-07-17 11:46:07
73Public-key cryptography / Preimage attack / Hash function / Digital Signature Algorithm / Collision / Digital signature / Crypt / Collision attack / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

NIST SP[removed], Randomized Hashing for Digital Signatures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:45:25
74Key management / Advantage / Public-key cryptography / CBC-MAC / Block cipher / Cipher / Key size / Tiny Encryption Algorithm / Digital signature forgery / Cryptography / Message authentication codes / Block cipher modes of operation

Related-Key and Key-Collision Attacks Against RMAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:23:34
75Smart card / Ubiquitous computing / FIPS 140-2 / FIPS 140 / Digital Signature Algorithm / Key / NSA cryptography / Hardware security module / Cryptography / Cryptography standards / Public-key cryptography

Pages: 22 TITLE: Security Policy for Palladium Secure Modem

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
76Cryptographic Module Validation Program / Elliptic curve cryptography / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key size / SHA-1 / Digital signature / Crypt / Cryptography / Cryptography standards / FIPS 140-2

The Cryptographic Algorithm Validation Program

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:47
77Key management / Elliptic curve cryptography / Digital Signature Algorithm / IEEE P1363 / Elliptic Curve DSA / PKCS / Digital signature / Key size / RSA / Cryptography / Public-key cryptography / Cryptography standards

Development of FIPS 186 Digital Signatures (and Elliptic Curves) Dustin Moody

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:33
78Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

NIST SP[removed], Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:36:25
79Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
80Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
UPDATE