<--- Back to Details
First PageDocument Content
HMAC / Hashing / Key size / FIPS 140 / PKCS / Cryptography / Cryptography standards / Cryptographic software
Date: 2007-12-17 00:00:00
HMAC
Hashing
Key size
FIPS 140
PKCS
Cryptography
Cryptography standards
Cryptographic software

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 337,83 KB

Share Document on Facebook

Similar Documents

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

DocID: 1ujwj - View Document

Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

DocID: 1sMuZ - View Document

Cryptography / Notary / Professional certification / Standards / Public key certificate

COMMONWEALTH OF VIRGINIA Department of Small Business and Supplier Diversity Virginia Employment Service Organization Certification Application Organization Name: Address:

DocID: 1rugH - View Document

Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

DocID: 1rrG7 - View Document

Cryptography / Turing Award laureates / Whitfield Diffie / Phillip Rogaway / Martin Hellman / Joseph Rotblat / National Institute of Standards and Technology / David Chaum / Cypherpunk

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

DocID: 1rqKX - View Document