Cryptography standards

Results: 2254



#Item
211Internet protocols / Internet security / Internet Standards / Secure communication / World Wide Web / Transport Layer Security / Internet censorship circumvention / SPDY / Telex / Public-key cryptography / Censorship / Tor

Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-03-31 17:22:53
212Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:28
213Cryptography / Signature / Cryptography standards / Computer law / Public-key cryptography / Key management / EIDAS / Digital signature / Electronic signature / Qualified electronic signature / Advanced electronic signature / Electronic authentication

PDF Document

Add to Reading List

Source URL: opensignature.org

Language: English - Date: 2013-09-02 12:52:30
214Computing / Internet / Software / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / Unbound / Installation / Start menu

PDF Document

Add to Reading List

Source URL: unbound.nlnetlabs.nl

Language: English - Date: 2010-11-08 06:57:17
215Digital television / Open standards / Consortia / Digital Living Network Alliance / Digital Transmission Content Protection / Public key certificate / Addendum / Device Keys / Cryptography / Consumer electronics / Digital audio

Microsoft Word - 294377_6.DOC

Add to Reading List

Source URL: www.dtcp.com

Language: English - Date: 2015-05-15 13:17:48
216Electronics / Aloaha / Non-volatile memory / Cryptography standards / Public-key cryptography / Factory reset / Smart card / Reset / PKCS / Computing / Disk encryption / USB

Microsoft Word - Personalisation of Aloaha Card.docx

Add to Reading List

Source URL: www.aloaha.com

Language: English - Date: 2014-02-19 09:27:40
217Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / DNS root zone / DNS spoofing / Domain name system / Internet / Internet protocols

Master Research Project Measuring the deployment of DNSSEC over the Internet Nicolas Canceill

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2015-05-30 08:14:06
218Key management / PAdES / XAdES / CAdES / Digital signature / European Telecommunications Standards Institute / Electronic signature / Cryptographic hash function / Public key certificate / Cryptography / Cryptography standards / Public-key cryptography

TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-05-12 09:17:43
219Internet standards / Cryptographic protocols / Public-key cryptography / Email / S/MIME / MIME / Internet media type / Cryptographic Message Syntax / PKCS / Cryptography / Computing / Internet

Network Working Group Request for Comments: 3851 Obsoletes: 2633 Category: Standards Track B. Ramsdell, Editor

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2004-07-19 20:37:49
220Computer security / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / FIPS 140-3 / Zeroisation / Cryptographic Module Testing Laboratory / Federal Information Processing Standard / Critical Security Parameter / Cryptography / Cryptography standards / Security

FIPS PUBCHANGE NOTICESFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-12-20 11:10:57
UPDATE