<--- Back to Details
First PageDocument Content
Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2
Date: 2016-07-27 10:26:48
Cryptography
Cryptography standards
Cryptographic software
Cryptographic hash functions
Hashing
Microsoft CryptoAPI
FIPS 140-2
FIPS 140
Hash-based message authentication code
Critical Security Parameter
Key Wrap
SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 584,62 KB

Share Document on Facebook

Similar Documents

FIPS	
  140-­‐2	
  Non-­‐Proprietary	
  Security	
  Policy:	
  SyncDog	
  Cryptographic	
  Module	
  	
    	
     	
  

FIPS  140-­‐2  Non-­‐Proprietary  Security  Policy:  SyncDog  Cryptographic  Module          

DocID: 1rYdh - View Document

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment  Who are we?

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

DocID: 1rsBK - View Document

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment  Who are we?

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

DocID: 1rgti - View Document

Cisco Catalyst 3750-X Switch  FIPSNon Proprietary Security Policy Level 1 Validation  Version 0.4

Cisco Catalyst 3750-X Switch FIPSNon Proprietary Security Policy Level 1 Validation Version 0.4

DocID: 1r6Sr - View Document

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment  Who are we?

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

DocID: 1qYdU - View Document