HMAC

Results: 319



#Item
221Network architecture / Internet protocols / Tunneling protocols / IPsec / Internet Key Exchange / Computer network security / HMAC / Cryptography standards / Cryptographic protocols / Computing / Data

Microsoft Word - SG100_SG1002 Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
222FIPS 140 / Cryptographic Module Validation Program / HMAC / Advanced Encryption Standard / SHA-2 / FIPS 140-3 / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - ACCI-TUCrypt-Crypto-Module-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
223Data / Cryptographic protocols / IPsec / HMAC / FIPS 140 / Critical Security Parameter / Avaya / Point-to-point protocol / Computing / Message authentication codes / Network architecture

Avaya G350 Branch Office Media Gateway w/FIPS Non-Proprietary Security Policy Avaya Inc. Revision Date: Thursday, October 20, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
224Cryptographic Module Validation Program / HMAC / Advanced Encryption Standard / Network Security Services / FIPS 140-2 / Cryptography / Cryptography standards / PKCS

FIPS  140-­‐2  Non-­‐Proprietary  Security  Policy:  McAfee  Virtual  SIEM  Cryptographic  Module,  Version  1.0          

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-23 07:51:00
225PKCS / HMAC / Cryptographic Module Validation Program / Advanced Encryption Standard / Network Security Services / Hardware security module / Cryptography / Cryptography standards / FIPS 140

FIPS  140-­‐2  Non-­‐Proprietary  Security  Policy:  McAfee  SIEM  Cryptographic  Module,  Version  1.0          

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-23 07:36:29
226Cryptographic software / Electronic commerce / Key size / HMAC / DES-X / Whitfield Diffie / SHA-1 / FIPS 140-2 / FIPS 140 / Cryptography / Cryptography standards / Key management

RSA BSAFE Crypto-J 3.5 Security Policy (jsafeJCE)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
227Internet protocols / Cryptographic protocols / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / HMAC / Extensible Threat Management / Transport Layer Security / Cryptography / Computing / Cryptography standards

Security Policy XTM - V2.2.7

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-18 15:57:36
228FIPS 140 / HMAC / Security token / SHA-2 / PKCS / Zeroisation / Advanced Encryption Standard / Cryptography / Cryptography standards / FIPS 140-2

Kanguru_Defender_Elite_200_Security_Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-14 10:53:00
229Security / Internet protocols / Cryptography standards / FIPS 140-2 / HMAC / FIPS 140 / Secure Shell / Authentication protocol / Password / Cryptography / Computing / Cryptographic protocols

Microsoft Word - 46e - Brocade DCX[removed]Security Policy Rev 1.2.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
230Key management / Cryptographic software / FIPS 140-2 / FIPS 140 / HMAC / Cryptographic Service Provider / Key generation / Zeroisation / Critical Security Parameter / Cryptography / Cryptography standards / Hashing

F-Secure Cryptographic Service Provider Security Policy 1 F-Secure Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE