Secure Hash Standard

Results: 51



#Item
21Internet protocols / Internet standards / Secure communication / FIPS 140-2 / SHA-2 / SHA-1 / Transport Layer Security / Cryptographic Module Validation Program / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: [removed]FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 15:51:49
22SHA-1 / Digital Signature Algorithm / Secure Hash Standard / Data Encryption Standard / Hash function / MD4 / SHA-2 / MD5 / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS[removed]Secure Hash Standard Page 1 of 21 Return to the FIPS Home Page

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:20
23Advanced Encryption Standard / Hashing / CRYPTREC / SHA-2 / National Security Agency / SHA-1 / Crypt / NESSIE / Secure Hash Standard / Cryptography / Cryptographic hash functions / Cryptography standards

X-Sieve: CMU Sieve[removed]Subject: Hash Algorithm Requirements and Evaluation Criteria. Date: Tue, 24 Apr[removed]:33:[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:18:28
24Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
25Internet protocols / Secure communication / Electronic commerce / HMAC / Cipher suite / FIPS 140 / SHA-2 / RSA / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 4g - McAfee NSP V6 1 IPS-NAC SecurityPolicy v1_11_HL2011[removed]Copy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
26Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
27Error detection and correction / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-2 / FIPS 140-2 / SHA-1 / Advanced Encryption Standard / Cryptography / Computing / Cryptography standards

Microsoft Word - 01j - 1B - Axway Security Kernel FIPS[removed]Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-12 10:17:29
28NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
29Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
30NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
UPDATE