SHA-2

Results: 893



#Item
691FIPS 140-2 / FIPS 140 / PKCS / SHA-2 / Cryptographic hash function / Microsoft CryptoAPI / Network Security Services / Cryptography / Cryptography standards / Cryptographic software

F-Secure Corporation F-Secure® Cryptographic Library™ FIPS[removed]Validation Security Policy Author: Alexey Kirichenko

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
692Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
693Advanced Encryption Standard / Block cipher / FIPS 140-2 / Data Encryption Standard / FIPS 140 / SHA-1 / Crypto++ / OpenSSL / Symmetric-key algorithm / Cryptography / Cryptographic software / Cryptography standards

ICC_FIPS140-2_Security_Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
694FIPS 140 / Cryptographic Module Validation Program / HMAC / Advanced Encryption Standard / SHA-2 / FIPS 140-3 / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - ACCI-TUCrypt-Crypto-Module-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
695Cryptography standards / Hashing / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / SHA-1 / Block cipher / Key size / Padding / Cryptography / Cryptographic hash functions / Error detection and correction

FIPS140-2 Security Policy for IBM CryptoLite in C (CLiC) FIPS140-2 Security Policy for CryptoLite in C (CLiC)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
696Cryptographic software / Electronic commerce / Key size / HMAC / DES-X / Whitfield Diffie / SHA-1 / FIPS 140-2 / FIPS 140 / Cryptography / Cryptography standards / Key management

RSA BSAFE Crypto-J 3.5 Security Policy (jsafeJCE)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
697FIPS 140 / HMAC / Security token / SHA-2 / PKCS / Zeroisation / Advanced Encryption Standard / Cryptography / Cryptography standards / FIPS 140-2

Kanguru_Defender_Elite_200_Security_Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-14 10:53:00
698FIPS 140-2 / United States Postal Service / Key size / Advanced Encryption Standard / Neopost / FIPS 140 / Postage meter / SHA-1 / Cryptography / Cryptography standards / Postal system

PSD Model 145, 146, 147,148 – Security Policy Version 27 PSD - OTH - Security Policy - US.docx PSD MODEL 145, 146, 147, 148

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-18 12:23:40
699Cryptographic hash functions / Electronic commerce / SHA-1 / SHA-2 / Public key certificate / Public key infrastructure / Sha / Cryptography / Public-key cryptography / Key management

Status Update for DTrade PKI/SHA-256 Digital Certificate Upgrade Industry Notice: DTrade PKI/SHA-256 Digital Certificates DDTC is upgrading the DTrade system to ensure compliance with the use of Access Certificates for E

Add to Reading List

Source URL: pmddtc.state.gov

Language: English - Date: 2013-11-12 10:52:02
700Cryptographic hash functions / Key management / Cryptography standards / HMAC / FIPS 140-2 / Zeroisation / SHA-2 / SHA-1 / Key size / Cryptography / Error detection and correction / Cryptographic software

1B - Crypto-C ME Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE