SHA

Results: 7306



#Item
161Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology / SHA-1 / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
162NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
163Climate of Hong Kong / Hong Kong Observatory / Tsim Sha Tsui / Typhoons / Weather forecasting / Hong Kong Time / Meteorology / World Meteorological Organization / Met Office / 557th Weather Wing / Weather station / Weather Underground of Hong Kong

Head 168 — HONG KONG OBSERVATORY

Add to Reading List

Source URL: www.budget.gov.hk

Language: English - Date: 2016-03-22 01:51:49
164Cryptographic software / Key management / Internet security / Transport Layer Security / Cryptography / OpenSSL / Heartbleed / SHA-1 / Key / GNU Privacy Guard / Public-key cryptography / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: blu.org

Language: English - Date: 2014-09-17 23:54:20
165Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
166Tsim Sha Tsui / Sogo / Sogo & Seibu / Department store / Silvercord / Canton Road / Mitsukoshi

<4D6963726F736F667420576F7264202D20897095B63135303790568B4B8F6F93588FF38BB581798A4A9358814682A082E8814095C29358814682A082E8817A>

Add to Reading List

Source URL: ci-z-holdings.com

Language: English - Date: 2015-08-03 00:12:08
167Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-08-02 22:30:34
168

2011 Annual Meeting of the Kennett Pike Association, Inc. Monday, October:00 PM – Hagley Soda House with refreshments Speakers: Brett Taylor, Legislative and Financial Advisor to Secretary of Transportation Sha

Add to Reading List

Source URL: www.kennettpike.com

- Date: 2014-09-05 01:27:06
    169Parliamentary procedure / Meeting / Adjournment / Agenda / Motion / Earth Hour / Executive session / Minutes

    CITY OF HUMBOLDT REGULAR CITY COUNCIL MEETING MINUTES MONDAY, MARCH 14, :00 P.M. The Council met in regular session on Monday, March 14, 2011 at 7:00 p.m. in the Community Room at City Hall, 725 Bridge. Mayor Sha

    Add to Reading List

    Source URL: www.humboldtkansas.org

    Language: English - Date: 2011-04-13 15:50:07
    170Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

    Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-29 15:19:10
    UPDATE