HMAC

Results: 319



#Item
141Computer architecture / Software / Message authentication codes / Hashing / FIPS 140 / HMAC / Vidyo / Zeroisation / Critical Security Parameter / Cryptography standards / Cryptography / Computing

1B - Vidyo Cryptographic Security Kernel Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-20 10:16:00
142Public-key cryptography / Internet protocols / Key management / Key size / Whitfield Diffie / HMAC / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - Patriot-SPDoc1.10.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
143Hashing / Secure communication / HMAC / Cipher suite / SHA-2 / AKA / Secure Shell / Password / Key / Cryptography / Security / Cryptographic protocols

Microsoft Word - 17e - McAfee NetworkSecurityPlatformV6.1 M-8000 P Security Policy V1.12.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-06 11:03:00
144Internet protocols / Secure communication / Electronic commerce / HMAC / Cipher suite / FIPS 140 / SHA-2 / RSA / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 4g - McAfee NSP V6 1 IPS-NAC SecurityPolicy v1_11_HL2011[removed]Copy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
145Key management / HMAC / Cryptographic hash function / SHA-2 / FIPS 140-2 / Key / Advanced Encryption Standard / Cryptography / Hashing / Message authentication codes

Microsoft Word - 01d - EPCL_Security_Policy_2010-CCS RedlinedD4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
146Key management / Advanced Encryption Standard / HMAC / FIPS 140-2 / Zeroisation / Microsoft CryptoAPI / Key generation / Cryptography / Cryptographic software / Cryptography standards

FIPS[removed]Security Policy for Motorola, Inc. The Motorola EMS Cryptographic Library Software Module Software Component Version:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
147Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
148Advanced Encryption Standard / FIPS 140-2 / FIPS 140 / Cryptographic software / Critical Security Parameter / HMAC / Zeroisation / Microsoft CryptoAPI / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - Vormetric Security Policy1.05.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-11-26 00:00:00
149Hardware security module / Zeroisation / HMAC / Smart card / Cryptography / Cryptography standards / FIPS 140

ZE d’CryptorTM ZE Cryptographic Module Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
150PKCS / FIPS 140-2 / FIPS 140 / Key Wrap / SHA-2 / HMAC / Advanced Encryption Standard / Cryptographic Module Validation Program / SHA-1 / Cryptography / Cryptography standards / Network Security Services

Microsoft Word - Security_ Policy_Wind_River_NSS_0801.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
UPDATE