![Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2 Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2](https://www.pdfsearch.io/img/25fcd100be0b85a2d9cab9182826ddf4.jpg) Date: 2016-07-27 10:26:48Cryptography Cryptography standards Cryptographic software Cryptographic hash functions Hashing Microsoft CryptoAPI FIPS 140-2 FIPS 140 Hash-based message authentication code Critical Security Parameter Key Wrap SHA-2 | | Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016Add to Reading ListSource URL: csrc.nist.govDownload Document from Source Website File Size: 584,62 KBShare Document on Facebook
|