Microsoft CryptoAPI

Results: 120



#Item
71Trusted computing / FIPS 140-2 / Trusted Platform Module / FIPS 140 / Hardware security module / Trusted Computing Group / Critical Security Parameter / Microsoft CryptoAPI / IBM / Computer security / Cryptography / Espionage

Secure64 Cryptographic Module Non-Proprietary Security Policy FIPS[removed]Level 2 For Version 1.2 December 2, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-31 00:00:00
72Advanced Encryption Standard / Cryptographic software / FIPS 140-2 / Fill device / FIPS 140 / Key size / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Key management

Security Policy 23 February 2007 Common Crypto Circuit Card Assembly Rockwell Collins Commercial Crypto Contract (CCC)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-03 00:00:00
73Computer security / ISO standards / Ubiquitous computing / FIPS 140-2 / FIPS 140 / Microsoft CryptoAPI / Subscriber identity module / Oberthur Technologies / ISO/IEC / Cryptography / Cryptography standards / Smart cards

Microsoft Word[removed]Cert. #[removed]Security Policy ID-One Cosmo V7-n[removed]doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-08-02 01:00:00
74Computing / FIPS 140-2 / FIPS 140 / Security token / Microsoft CryptoAPI / Cryptographic Module Testing Laboratory / Cryptography standards / Computer security / Cryptography

Entrust Cryptographic Module 6.0 FIPS[removed]Validation Security Policy Author: Pierre Boucher

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
75Cryptographic software / FIPS 140-2 / Smart card / PKCS / FIPS 140 / Pitney Bowes / Digital signature / CryptoGraf / Microsoft CryptoAPI / Cryptography / Cryptography standards / Public-key cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
76Cryptographic software / Computer network security / FIPS 140 / Hardware security module / Microsoft CryptoAPI / Access control / Security / Cryptography standards / Computer security

Microsoft Word - CR-2688_4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-27 00:00:00
77Microsoft CryptoAPI / Hashing / CryptGenRandom / Cryptographic Service Provider / Key generation / Public-key cryptography / Symmetric-key algorithm / Cryptographic hash function / Key / Cryptography / Key management / Cryptographic software

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
78Advanced Encryption Standard / Cryptographic hash functions / FIPS 140-2 / HMAC / Crypt / SHA-1 / Symmetric-key algorithm / Key size / Microsoft CryptoAPI / Cryptography / Hashing / Cryptographic software

Symantec Cryptographic Module 1.0 FIPS[removed]Non-Proprietary Security Policy 1.0 Symantec Cryptographic Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
79FIPS 140-2 / FIPS 140 / Junos / Zeroisation / Secure Shell / Critical Security Parameter / Juniper Networks / Microsoft CryptoAPI / Cryptography standards / Computer security / Computing

Junos Cryptographic Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-02 08:44:50
80FIPS 140-2 / FIPS 140 / PKCS11 / Critical Security Parameter / PKCS / Cryptographic Module Validation Program / Hardware security module / Microsoft CryptoAPI / Cryptography standards / Cryptography / Computer security

Microsoft Word - EtkSK -- Security Policy-v1.10.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE