HMAC

Results: 319



#Item
241Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / HMAC / Block cipher / Key size / SHA-1 / Symmetric-key algorithm / Padding / Cryptography / Cryptographic hash functions / Hashing

Cryptolite Security Policy-o.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
242Data / Cryptographic protocols / Tunneling protocols / HMAC / Hashing / Advanced Encryption Standard / IPsec / Cryptography standards / Cryptography / Computing / Internet protocols

Microsoft Word[removed]001_d.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-31 00:00:00
243FIPS 140 / HMAC / BlackBerry / Zeroisation / SHA-1 / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - BlackBerry Cryptographic Kernel v3.6.1 FIPS[removed]Security.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
244Advanced Encryption Standard / FIPS 140 / IEEE 802.11i-2004 / HMAC / AES implementations / Cryptography / Cryptography standards / Computer security

Wireless for the Outdoor EnterpriseTM MD4000-FIPS Structured Meshâ„¢ Module FIPS[removed]Security Policy Nov 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
245Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
246Cryptography standards / Cryptographic hash functions / Message authentication codes / HMAC / Hashing / Secure Shell / SHA-2 / SHA-1 / FIPS 140-2 / Cryptography / Error detection and correction / Cryptographic software

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
247Security / Cryptography standards / Internet protocols / FIPS 140-2 / HMAC / FIPS 140 / Secure Shell / Authentication protocol / Password / Cryptography / Computing / Cryptographic protocols

Microsoft Word - 50b - Brocade 7500 Security Policy V1.2.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
248Cryptographic hash functions / Cryptography standards / Key Wrap / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / BeeCrypt / Crypto++ / Cryptography / Cryptographic software / Hashing

Cryptographic Key Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-06 08:47:36
249Hashing / Cryptographic hash function / Key / HMAC / Symmetric-key algorithm / Block cipher / CMAC / Initialization vector / Advanced Encryption Standard / Cryptography / Message authentication codes / Key management

NIST SP 800-56C Second Draft, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 13:48:23
250FIPS 140 / PKCS11 / PKCS / Cryptographic Module Validation Program / Critical Security Parameter / HMAC / Cryptographic hash function / SHA-2 / Advanced Encryption Standard / Cryptography / Cryptography standards / FIPS 140-2

Entrust Admin User Groups Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE