Back to Results
First PageMeta Content
HMAC / Hashing / Key size / FIPS 140 / PKCS / Cryptography / Cryptography standards / Cryptographic software


Non-Proprietary Security Policy
Add to Reading List

Document Date: 2007-12-17 00:00:00


Open Document

File Size: 337,83 KB

Share Result on Facebook

City

Fairfax / Reston / /

Company

TriCipher Inc. / Corsec Security Inc. / EMC / /

Event

Business Partnership / /

Facility

Crypto Core Library / National Institute of Standards and Technology / Overview The TriCipher Common Core Library / port Status Output Interface Hard Disk / /

/

IndustryTerm

software module / message digest algorithm / client software / physical device / hard opaque metal / cryptographic services / crypto services / specified operating systems / /

OperatingSystem

Windows XP / Linux / Microsoft Windows / /

Organization

National Institute of Standards and Technology / Monitor Standard PC Block Diagram Crypto Boundary Memory Integrated Graphics Central Processing Unit / U.S. Government / DOCUMENT ORGANIZATION / /

Person

Key Certificate / Role / H. Johnson Defined / Clock driver / H. Johnson Addressed / H. Johnson Modfied / Key Exponent / Darryl H. Johnson / /

/

Position

The Crypto Officer / CRYPTO OFFICER / System Controller / Officer / Controller / /

Product

TriCipher Common Crypto Core Module / Client software / Client / /

ProgrammingLanguage

Java / /

ProvinceOrState

Virginia / /

RadioStation

Core / /

Technology

encryption / Universal Serial Bus / Cryptography / message digest algorithm / Public Key / Linux System / Java / Finite State Machine / Linux / API / Private key / random access / Operating System / length outbound encryption / operating systems / integrated circuits / IEEE 1394 / UART / /

URL

http /

SocialTag