HMAC

Results: 319



#Item
111Secure communication / Computing / Data / Cryptographic software / Internet standards / Cipher suite / Secure Shell / Transport Layer Security / HMAC / Cryptographic protocols / Cryptography / Internet protocols

Microsoft Word - 09j - Xirrus XR Product Family Security Policy Rev2.7_accepted.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:32:58
112Cryptography standards / Internet protocols / Secure communication / Cryptographic protocols / Motorola / FIPS 140-2 / HMAC / Cipher suite / FIPS 140 / Cryptography / Computing / Schaumburg /  Illinois

Microsoft Word - 1d - AP7131N_Access_Point_Crypto_Module_Security_Policy R1.2.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 09:50:05
113Cryptographic software / HMAC / Hashing / FIPS 140 / Advanced Encryption Standard / Cisco IOS / Cisco Systems / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Computing

Microsoft Word - IC2M Security Policy_rel(1.5).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-15 15:13:53
114Error detection and correction / Hashing / Cryptographic hash functions / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptography standards / Spaceflight

Microsoft Word - 23g - ISS HA-ECT FIPS[removed]Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 08:43:12
115Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:38:26
116Internet protocols / Data / Secure communication / Hashing / Cryptographic hash functions / HMAC / IPsec / Cipher suite / SHA-1 / Cryptography / Cryptographic protocols / Computing

Microsoft Word - 8e - 4x_RFS7K_Crypto_Module_Security_Policy R1.2.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 16:11:46
117Internet protocols / Secure communication / Cryptography standards / SHA-2 / HMAC / Secure Shell / Cipher suite / Key size / Key generation / Cryptography / Key management / Cryptographic hash functions

Microsoft Word - 201i - McAfee NSP V7.1 IPS-NAC SecurityPolicy v1.20.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:08:42
118Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
119Cryptographic hash functions / FIPS 140 / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / MD5 / Crypto++ / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - 800b - AQ42-M-Security Policy_v100_draft_140813.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-12 18:31:20
120Clinical research / Pharmaceutical industry / European Directive on Traditional Herbal Medicinal Products / European Union / European Medicines Agency / Yellow Card Scheme / Pharmacovigilance / Herbalism / Medicines and Healthcare products Regulatory Agency / Medicine / Health / Pharmaceutical sciences

Microsoft Word - HMAC Final Web minutes 23 July 2014PAR.doc

Add to Reading List

Source URL: www.mhra.gov.uk

Language: English - Date: 2014-10-23 07:01:54
UPDATE