<--- Back to Details
First PageDocument Content
Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards
Date: 2014-07-10 13:14:41
Data Encryption Standard
National Security Agency
Digital Signature Algorithm
SHA-2
SHA-1
Key size
Secure Hash Standard
NIST hash function competition
FIPS 140-2
Cryptography
Cryptographic hash functions
Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 815,98 KB

Share Document on Facebook

Similar Documents

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

DocID: 1tx5k - View Document

Cryptography / Abstract algebra / Algebra / Group theory / Finite fields / Elliptic curve cryptography / Public-key cryptography / Elliptic curves / Weil pairing / Elliptic curve / Elliptic Curve Digital Signature Algorithm / Discrete logarithm

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

DocID: 1r4ER - View Document

Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

DocID: 1qPjA - View Document

Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

DocID: 1qLzt - View Document

Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

DocID: 1qHZI - View Document