Digital Signature Standard

Results: 72



#Item
51National Institute of Standards and Technology / Federal Information Processing Standard / Digital Signature Algorithm / Security / FIPS 140-3 / FIPS 201 / FIPS 140 / FIPS / Data Encryption Standard / Cryptography / Cryptography standards / Standards

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-11-08 07:43:35
52Cryptography / Contract / Civil law / Digital signature / Contract law / Law / Legal documents

SIGNING OF AGREEMENTS Policy and Procedures Routing of contracts and agreements for approval and signature typically involves the following steps: For Standard Contracts and

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2014-07-18 11:35:36
53Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
54Key / FIPS 140-2 / Symmetric-key algorithm / Message authentication code / Digital Signature Algorithm / Block cipher / Data Encryption Standard / Digital signature / Cryptographic key types / Cryptography / Key management / Public-key cryptography

ITL BULLETIN FOR DECEMBER 2012 GENERATING SECURE CRYPTOGRAPHIC KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC KEY MANAGEMENT AND THE PROTECTION OF SENSITIVE INFORMATION Shirley Radack, Editor Computer Security Division Info

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 13:52:53
55Digital Signature Algorithm / Federal Information Processing Standard / Elliptic Curve DSA / Digital signature / FIPS 140 / PKCS / Key size / RSA / FIPS / Cryptography / Public-key cryptography / Cryptography standards

Federal Register / Vol. 78, No[removed]Friday, July 19, [removed]Notices This notice constitutes the antidumping duty order with respect to xanthan gum from the PRC pursuant to section 736(a) of the Act. Interested parties

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2013-07-19 03:02:53
56SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
57Electronic documents / SAFE-BioPharma Association / Digital signature / Electronic signature / Digital credential / Credential / Cryptography / Key management / Public-key cryptography

The SAFE-BioPharma Standard The SAFE-BioPharma Standard SAFE-BioPharma® is the global standard created and used by the biopharmaceutical and healthcare sectors to assure high trust in cyber-identities and to enable sec

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2014-03-18 17:38:04
58Advanced Encryption Standard / Standards / Federal Information Processing Standard / Outline of cryptography / NSA Suite B Cryptography / Digital Signature Algorithm / Key size / Federal Information Security Management Act / Data Encryption Standard / Cryptography / Cryptography standards / National Institute of Standards and Technology

NISTIR[removed]NIST Cryptographic Standards and Guidelines Development Process (Draft) The Cryptographic Technology Group

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-18 11:32:45
59Key management / RSA / Cryptanalysis / Data Encryption Standard / Block cipher / Differential cryptanalysis / Eli Biham / Timing attack / Digital signature / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
60Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Group of pictures / Digital signature / Macroblock / Inter frame / H.262/MPEG-2 Part 2 / Video compression / Cryptography / Video

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:00
UPDATE