Cryptography standards

Results: 2254



#Item
791Secure communication / Cryptography standards / Cryptographic software / Cipher suite / Transport Layer Security / Camellia / Galois/Counter Mode / CRYPTREC / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

Internet Engineering Task Force (IETF) Request for Comments: 6367 Category: Informational ISSN: [removed]S. Kanno

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-09-07 17:41:39
792IPv4 / Block cipher / Transmission Control Protocol / IP address / Internet / Network architecture / Internet standards / OSI protocols

Computer Networks[removed]–272 www.elsevier.com/locate/comnet Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-07-12 00:45:31
793Computing / Cryptography / Internet / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / RC4 / Cryptographic protocols / Secure communication / Internet protocols

This POODLE Bites: Exploiting The  SSL 3.0 Fallback  Security Advisory  Bodo Möller, Thai Duong, Krzysztof Kotowicz  Google  September 2014 

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-10-14 16:57:53
794Markup languages / Computer file formats / Technical communication / XML Signature / XSLT / Canonicalization / WS-Security / SOAP / XPath / Computing / Cryptography standards / XML

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products XML Signature/Encryption — the Basis of Web Services Security

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:28:57
795Internet protocols / Internet standards / Online Certificate Status Protocol / Revocation list / X.509 / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Using Dirmngr for version 1.0.2, 31 July 2008 Steffen Hansen ([removed]) Werner Koch ([removed])

Add to Reading List

Source URL: gnupg.org

Language: English - Date: 2008-07-31 08:03:50
796Computing / Routing / ASCII art / Classless Inter-Domain Routing / IP address / IPv4 / Block cipher / Transmission Control Protocol / Pseudorandom permutation / Network architecture / Internet / Internet standards

Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Jun Xu Jinliang Fan Mostafa H. Ammar College of Computing Georgia Institute of Technology Atlanta, GA

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-07-12 02:12:02
797Secure communication / Computing / Data / Internet standards / Electronic commerce / Cipher suite / Transport Layer Security / NSA Suite B Cryptography / Elliptic Curve DSA / Cryptographic protocols / Internet protocols / Cryptography

Internet Engineering Task Force (IETF) Request for Comments: 6460 Obsoletes: 5430 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-01-20 18:48:17
798Cryptographic protocols / Internet protocols / Internet standards / Online Certificate Status Protocol / Revocation list / Public key certificate / Certificate authority / Public key infrastructure / Digital signature / Cryptography / Public-key cryptography / Key management

A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga1 and Kouichi Sakurai2 1 Graduate School of Information Science and Electrical Engineering,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
799Pseudorandom number generators / Key / National Institute of Standards and Technology / CRYPTREC / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

NIST removes cryptography algorithm from random number generator recommendations

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-02-26 04:25:01
800Computer security / Computing / Computer architecture / NonStop / Security / Encryption / HP StorageWorks / Backup / HP Data Protector / Disk encryption / Cryptography / Cryptographic software

HP NonStop Volume Level Encryption Data sheet More than 20,000 security standards have emerged worldwide and nearly all include requirements to protect data-at-rest from exposure by theft or media

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
UPDATE