Back to Results
First PageMeta Content
Cryptographic Module Validation Program / Elliptic curve cryptography / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key size / SHA-1 / Digital signature / Crypt / Cryptography / Cryptography standards / FIPS 140-2


The Cryptographic Algorithm Validation Program
Add to Reading List

Document Date: 2013-12-31 15:31:47


Open Document

File Size: 581,64 KB

Share Result on Facebook

Company

GMAC / AES / CBC / Conformance Cryptographic Algorithm Implementations Laboratory / NIST IT Security Automation Conference Sharon Keller / /

Country

Canada / /

Event

M&A / /

IndustryTerm

assurance that cryptographic algorithm / cryptographic algorithm / cryptographic algorithms / /

Organization

European Central Bank / United States Federal Government / /

Person

NIST CAVP / Sharon Keller / /

Position

Director / /

ProgrammingLanguage

EC / /

Technology

ENCRYPTION / Approved* cryptographic algorithm / 2002 Cryptographic Algorithm / Cryptography / SHA algorithm / FFC ECC FA EA FB EB FC EC ED EE dhOneFlow dhStatic SHA algorithms / cryptographic algorithms / /

SocialTag