HMAC

Results: 319



#Item
231Computer security / Computing / HMAC / Hashing / Elliptic curve cryptography / FIPS 140-2 / FIPS 140 / Cryptlib / Crypto++ / Cryptography / Cryptographic software / Cryptography standards

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy (SPARC T4) Level 1 with Level 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-25 07:06:30
232Cryptographic hash functions / Key management / Cryptography standards / HMAC / FIPS 140-2 / Zeroisation / SHA-2 / SHA-1 / Key size / Cryptography / Error detection and correction / Cryptographic software

1B - Crypto-C ME Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
233Key management / Cryptographic software / Advanced Encryption Standard / NSA Suite B Cryptography / HMAC / Key Wrap / Key / FIPS 140-2 / Block cipher modes of operation / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - 1e - Mocana Suite B 5.5fs Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-27 16:48:28
234Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:54:42
235Cryptographic hash functions / FIPS 140-2 / HMAC / FIPS 140 / SHA-1 / Advanced Encryption Standard / Crypto++ / CryptGenRandom / Cryptography / Cryptography standards / Cryptographic software

SBGSE1_SecurityPolicyPalm-_9-30-03_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
236Critical Security Parameter / FIPS 140-2 / Key management / FIPS 140 / Cryptographic hash function / Key Wrap / Zeroisation / HMAC / Public-key cryptography / Cryptography / Cryptography standards / PKCS

C4CS Security Policy Security Policy for Version 1.2.2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-08-21 01:00:00
237Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-17 01:00:00
238FIPS 140-2 / FIPS 140 / Security token / Key / HMAC / Microsoft CryptoAPI / Cryptographic Module Testing Laboratory / Cryptography / Computer security / Cryptography standards

Entrust Technologies Entrust Cryptographic Module 5.1 FIPS[removed]Validation Security Policy Author:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
239Computer security / Windows CE / Windows Mobile / FIPS 140-2 / Windows XP / HMAC / Pocket PC / FIPS 140 / SHA-2 / Cryptography standards / Cryptography / Computing

Mobile Armor Mobile Armorâ„¢ Warp Drive[removed]Security Policy FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
240Cryptography standards / FIPS 140-2 / FIPS 140 / Zeroisation / HMAC / Microsoft CryptoAPI / CryptGenRandom / Cryptography / Cryptographic software / Computer security

Microsoft Word - Trust Digital Security Policy-M5update1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE