Cryptography standards

Results: 2254



#Item
881Cryptographic software / Cryptographic hash functions / Key generation / FIPS 140 / SHA-2 / SHA-1 / Key / Microsoft CryptoAPI / CRYPTREC / Cryptography / Key management / Cryptography standards

Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-13 13:30:44
882Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
883FIPS 140 / Password / Computing / Cyberwarfare / Security and safety features new to Windows Vista / Security token / Cryptography standards / Computer security / FIPS 140-2

3e Technologies International (3eTI) FIPS[removed]Non-Proprietary Security Policy 3e Technologies International, Inc. FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 01:13:44
884Network architecture / Key management / Public-key cryptography / Computing / Internet standards / Domain Name System Security Extensions / Domain name / Technical Center of Internet / Public key certificate / Internet / Domain name system / Internet protocols

RU DNSSEC Policy and Practice Statement RU DNSSEC Policy and Practice Statement ..................................................................................1 INTRODUCTION ...........................................

Add to Reading List

Source URL: tcinet.ru

Language: English - Date: 2013-06-20 10:50:17
885Key management / Public-key cryptography / Network architecture / Computing / Internet standards / Domain Name System Security Extensions / Technical Center of Internet / Domain name / Public key certificate / Internet / Domain name system / Internet protocols

XN--P1AI (РФ) DNSSEC Policy and Practice Statement XN--P1AI (РФ) DNSSEC Policy and Practice Statement ..............................................................1 INTRODUCTION .....................................

Add to Reading List

Source URL: tcinet.ru

Language: English - Date: 2013-06-20 10:50:16
886National Institute of Standards and Technology / Cryptography standards / Thought / Ethics / National Accreditation Board for Testing and Calibration Laboratories / National Voluntary Laboratory Accreditation Program / Accreditation / Quality assurance / Evaluation

Preparation of Draft Scope of Accreditation Testing Laboratories Only The following information must accompany the Application for Accreditation to assist in preparation of the Scope of Accreditation. Using the format on

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2015-01-05 14:06:51
887Computer security / National Information Assurance Partnership / FIPS 140-2 / Thought / Common Criteria / Traceability / National Voluntary Laboratory Accreditation Program / Accreditation / National Institute of Standards and Technology / ISO standards / Evaluation / Cryptography standards

Toward Credible IT Testing and Certification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:44:18
888Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
889Common Criteria Testing Laboratory / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Thought / Common Criteria / FIPS 140-2 / Protection Profile / Cryptographic Module Validation Program / FIPS 140 / Cryptography standards / Evaluation / Computer security

Specifying Cryptographic Requirements in Security Targets

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-11-04 13:27:53
890Public key certificate / Name change / Government / Public-key cryptography / Electronic commerce / Key management

HTSB Form LA[removed]Rev[removed]Hawai`i Teacher Standards Board 650 Iwilei Road, Suite 201

Add to Reading List

Source URL: www.htsb.org

Language: English - Date: 2014-12-08 14:57:26
UPDATE