SHA-2

Results: 893



#Item
551PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
552FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / SHA-1 / Cryptographic hash function / FIPS 140-3 / IBM / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - ISS GX 4-3 Series FIPS 140 Security Policy v1-6-LegacyGX.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-06 11:54:54
553Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
554Cryptographic hash functions / Key management / X.509 / Digital signature / Validation / SHA-2 / SHA-1 / Cambridge Rindge and Latin School / Cryptography / Public-key cryptography / Cryptographic protocols

Path Validation Testing NIST Recom m endation for X.509 Path Validation David Cooper M ay 19, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
555Public-key cryptography / Cryptographic hash functions / ISO standards / FIPS 140 / PKCS / Java Card / Gemalto / Key size / SHA-2 / Cryptography / Cryptography standards / Smart cards

Microsoft Word - 4c - D1244115_MultiApp_V3_FIPS_SP_V1.4_add contactless.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-07 16:34:14
556SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
557Hashing / BlackBerry / Embedded operating systems / Smartphones / FIPS 140-2 / BlackBerry OS / FIPS 140 / HMAC / SHA-2 / Cryptography / Computing / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-11-30 00:00:00
558Computing / Software / Cryptographic hash functions / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / SHA-2 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-14 15:12:00
559RAID / ZFS / SHA-2 / Nexenta OS / SHA-1 / Checksum / File system / Solid-state drive / Computer architecture / Cryptographic hash functions / Computing / Disk file systems

ZFS on SMR Drives Enabling Shingled Magnetic Recording (SMR) for Enterprises ROBERT E. NOVAK |

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:51:22
560Hashing / Search algorithms / Hash function / Preimage attack / Collision attack / SHA-1 / SHA-2 / Padding / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
UPDATE