SHA-2

Results: 893



#Item
671CTC / Massachusetts Route 2 / Cryptographic hash functions / California postmile / SHA-2

Microsoft Word[removed]Vote.doc

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2011-09-13 13:49:13
672CTC / Electronic Arts / California postmile / Software development / Video game development / Cryptographic hash functions / SHA-2

Microsoft Word[removed]Vote.doc

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2012-04-06 19:45:23
673FIPS 140-2 / Digital Signature Algorithm / National Security Agency / SHA-1 / Capstone / NSA cryptography / Cryptography / Public-key cryptography / Fortezza

Pages: 22 TITLE: Security Policy for FORTEZZA Crypto Card DATE: May 5, 1997

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
674FIPS 140-2 / FIPS 140 / Cryptographic hash function / Security token / SHA-1 / Key management / Cryptography / Cryptography standards / Computer security

Virtual Cryptographic Authentication Token (SmartPass VCAT) FIPS[removed]Non-Proprietary Cryptographic Module Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
675Cryptographic hash functions / Campbell County /  Kentucky / Kentucky Route 9 / Road / Segregated cycle facilities / SHA-1 / CTC / SHA-2 / Construction / Transport / Road transport / Land transport

CTC Financial Vote List 2.5 June 25, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-06-13 11:50:59
676Cryptographic hash functions / Computing / FIPS 140 / SHA-2 / SHA-1 / HMAC / MD5 / Crypto++ / Error detection and correction / Cryptography / Cryptography standards

FIPS[removed]Non-Proprietary Security Policy Aspen Document Version[removed]Sony Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-21 13:06:22
677Cryptographic Module Validation Program / FIPS 140-3 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Testing Laboratory / SHA-2 / SHA-1 / Common Criteria / Key Wrap / Cryptography standards / Cryptography / FIPS 140-2

Frequently Asked Questions for the Cryptograhic Module Validation Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-05 12:28:51
678Cryptography standards / Cryptographic hash functions / Message authentication codes / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Hashing

BitArmor Secure Cryptographic Engine Version 1.2 Security Policy v 1.1 BitArmor Systems, Inc 401 Liberty Avenue, Suite 1900

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-11 00:00:00
679Cryptographic protocols / Internet standards / S/MIME / Public key infrastructure / X.509 / PKCS / MIME / Digital signature / SHA-2 / Cryptography / Public-key cryptography / Email

NIST SP[removed], Federal S/MIME V3 Client Profile

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 09:56:36
680Advanced Encryption Standard / Cryptographic hash functions / FIPS 140-2 / HMAC / Crypt / SHA-1 / Symmetric-key algorithm / Key size / Microsoft CryptoAPI / Cryptography / Hashing / Cryptographic software

Symantec Cryptographic Module 1.0 FIPS[removed]Non-Proprietary Security Policy 1.0 Symantec Cryptographic Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE