First Page | Meta Content | |
---|---|---|
Document Date: 2012-08-27 10:06:47Open Document File Size: 221,38 KBShare Result on FacebookCompanyAES / Securing Agency Information Systems / /FacilityNational Institute of Standards and Technology / /IndustryTermhash-based key derivation algorithms / agreement algorithm / invertible symmetric-key cryptographic algorithm / cryptographic applications / digital signature algorithm / hash algorithms / transformation algorithm / hash algorithm / digital signature applications / security systems / cryptographic algorithm / /OrganizationNational Institute of Standards and Technology / U.S. Department of Commerce / office of Management and Budget / /PersonAbstract Hash / Patrick Gallagher / John Kelsey / Lily Chen / Daniel Brown / Ray Perlner / Morris Dworkin / Quynh Dang / Praveen Gauravaram / Elaine Barker / Hugo Krawczyk / Donna F. Dodson / William E. Burr / Rebecca M. Blank / W. Timothy Polk / Andrew Regenscheid / Richard Davis / /Positionauthor / Acting Secretary / Director / Secretary of Commerce / Director / Acknowledgements The author / Secretary of Commerce under statutory authority / Under Secretary of Commerce / federal official / /ProgrammingLanguageK / /PublishedMediumPublic Law / /Technologyencryption / hash algorithm / key agreement algorithm / Information Technology / Approved hash algorithms Hash algorithms / seven approved hash algorithms / hash-based key derivation algorithms / Block cipher / hash algorithms / secret key / unvarying transformation algorithm / digital signature / invertible symmetric-key cryptographic algorithm / 6 Approved Hash Algorithms / MAC algorithm An algorithm / digital signature algorithm / 4 Approved Hash Algorithms / cryptographic algorithm / /SocialTag |