Secure Hash Standard

Results: 51



#Item
11Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 11:56:40
12fipswith change notice.doc

fipswith change notice.doc

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-09-21 12:04:14
13On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1  Department of Telematics, Norwegian University of Science and Technology,

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
14Standards for Efficient Cryptography  SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
15Standards for Efficient Cryptography  SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
16SHA-3 Standard: Overview, Status, Public Comment

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
17Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
18FIPS PUB[removed]Security Policy for  SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
19Microsoft Word - 2c - Globo Server FIPS 140 Security Policy v1-1.doc

Microsoft Word - 2c - Globo Server FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:21:10
20Microsoft Word - 1c - Globo Mobile FIPS 140 Security Policy v1-1.doc

Microsoft Word - 1c - Globo Mobile FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:12:12