Cryptography standards

Results: 2254



#Item
631Computing / Cryptographic Module Validation Program / Firmware / Aladdin Knowledge Systems / Cyberwarfare / Cryptography standards / Computer security / FIPS 140-2

http://csrc.nist.gov/groups/STM/cmvp/documents[removed]140val-all.htm Certificate Number Validation / Posting Date

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-19 09:39:33
632Internet standards / Cryptographic software / Public-key cryptography / PGP / FTP / Pretty Good Privacy / FTPS / File Transfer Protocol / Managed file transfer / Cryptography / Internet / Computing

DATA SHEET DIPLOMAT ® EBUSINESS SOLUTION OVERVIEW McAfee® no longer directly supports E-Business Server. If your business relies on McAfee E-Biz Server, try Diplomat eBusiness Solution to replace PGP command line and s

Add to Reading List

Source URL: www.coviantsoftware.com

Language: English - Date: 2014-04-03 17:16:37
633FIPS 140-2 / FIPS 140 / Evaluation / Reference / Cryptographic Module Validation Program / Aruba / Federal Information Processing Standard / Cryptography standards / Aruba Networks / Computing

Dell W-7200 Series Controllers with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPS[removed]Level 2 January 12, 2015 This is to advise that the document entitled “Aruba 7200 Series Controllers with ArubaOS FI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-12 14:54:33
634Internet standards / Cryptography / Cryptographic software / Internet / Computing / Password / Cryptographic protocols / Internet protocols

How to install digital certificates in the CAPI store Introduction For users who move away from the CSI login method, you will need to install digital certificates into the CAPI store and set-up a password for each certi

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2013-10-01 19:03:08
635Cryptographic hash functions / CRYPTREC / SC2000 / Hierocrypt / FIPS 140-2 / Symmetric-key algorithm / CIPHERUNICORN-E / SHA-1 / CIPHERUNICORN-A / Cryptography / Cryptography standards / Block ciphers

4-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:09:35
636Network architecture / Cryptographic protocols / Internet standards / Computer network security / Tunneling protocols / IPsec / Transport Layer Security / Public-key cryptography / Border Gateway Protocol / Computing / Internet protocols / Internet

ATNICG/5-WP[removed]International Civil Aviation Organization THE FIFTH MEETING OF AERONAUTICAL TELECOMMUNICATION NETWORK (ATN) IMPLEMENTATION CO-ORDINATION GROUP

Add to Reading List

Source URL: www.icao.int

Language: English - Date: 2013-04-30 16:55:47
637Cryptography / Computing / Data / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / RC4 / Transmission Control Protocol / Cryptographic protocols / Secure communication / Internet protocols

Network Working Group Request for Comments: 5246 Obsoletes: 3268, 4346, 4366 Updates: 4492 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-08-15 16:53:06
638Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
639Computing / Data / Secure communication / Cryptographic software / Internet standards / GnuTLS / Cipher suite / X.509 / Public-key cryptography / Cryptographic protocols / Cryptography / Internet protocols

This document includes text contributed by Nikos Mavrogiannopoulos, Simon Josefsson, Daiki Ueno, Carolin Latze, Alfredo Pironti, Ted Zlatanov and Andrew McDonald. Several corrections are due to Patrick Pelletier and Andr

Add to Reading List

Source URL: www.gnutls.org

Language: English - Date: 2015-04-08 06:00:06
640Public-key cryptography / Internet standards / Key management / Email authentication / S/MIME / X.509 / Certificate Management Protocol / Certificate policy / Public key infrastructure / Cryptography / Computing / Cryptographic protocols

S/MIME - great idea, pity about the implementation

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:57
UPDATE