Cryptography standards

Results: 2254



#Item
271Steganography / Computing / Graphics file formats / ISO standards / Computer file formats / Steganalysis / JPEG / Digital watermarking / Quantization / Cryptography / Espionage / Digital photography

STEGANOGRAPHY AND DIGITAL WATERMARKING Determining the stego algorithm for JPEG images T. Pevny´ and J. Fridrich Abstract: The goal of forensic steganalysis is to detect the presence of embedded data and to eventually

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-10-03 14:01:42
272Secure communication / Computing / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / RC4 / Password / Internet protocols / Cryptography / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 14:35:42
273Server hardware / Backplane / FIPS 140 / Blade server / Fortinet / Cryptography standards / Computing / Computer buses

FortiProduct Administration Guide version 4.0.0

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-05 07:40:14
274Cryptography / Computing / Data / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / RC4 / Cryptographic protocols / Secure communication / Internet protocols

This POODLE Bites: Exploiting The SSL 3.0 Fallback Page 1

Add to Reading List

Source URL: poodlebleed.com

Language: English - Date: 2014-10-15 00:08:45
275Cryptography / Internet protocols / Computer security / Cryptography standards / Tunneling protocols / Transport Layer Security / Secure Shell / Fortinet / FIPS 140-2 / Computing / Computer network security / Cryptographic protocols

FIPSSecurity Policy FortiOS™ 5.0 STATUS ALARM HA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-29 10:54:02
276Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
277Secure communication / Cryptographic software / Internet standards / Cipher suite / Secure Shell / Transport Layer Security / HMAC / Key size / Public-key cryptography / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-07 14:15:51
278Medicine / Electronic commerce / Key management / Public key certificate / Professional certification / Nursing home / Health / Public-key cryptography / Standards / Healthcare

744 P Street, MS, Sacramento, CADate: APPLICATION FOR ADMINISTRATOR RE-CERTIFICATION Certificate #:

Add to Reading List

Source URL: www.dss.cahwnet.gov

Language: English - Date: 2012-12-11 18:17:11
279FIPS 140-2 / HMAC / Microsoft CryptoAPI / Critical Security Parameter / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key Wrap / Zeroisation / Cryptography / Cryptographic software / Cryptography standards

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
280FIPS 140-2 / FIPS 140 / Password / Zeroisation / SHA-2 / Universal Flash Storage / Hardware random number generator / Cryptography / Cryptography standards / Randomness

Samsung UFS (Universal Flash Storage) Shark SED FIPSSecurity Policy Document Revision: 1.0 H.W. Version: KLUAG2G1BD-B0B2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:46:21
UPDATE