Digital Signature Algorithm

Results: 127



#Item
51Symmetric-key algorithm / Public key infrastructure / Key / Digital signature / Certificate policy / Ciphertext / X.509 / Cipher / Cryptosystem / Cryptography / Key management / Public-key cryptography

Overview of PKI for the CSOS Program

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:26:06
52Quality / Validation / FIPS 140-2 / Elliptic curve cryptography / Key derivation function / Key / Digital Signature Algorithm / Acceptance testing / Crypt / Cryptography / Key management / Public-key cryptography

The Key Agreement Schemes Validation System (KASVS) Updated: May 22, 2014 Previously Updated: January 23, 2013 Previously Updated: September 1, 2011

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-22 10:26:32
53Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
54Validity / Cryptography standards / Elliptic Curve DSA / Digital signature / Secure Shell / Validation / Verification and validation / FIPS 140-2 / Cryptography / Public-key cryptography / Pharmaceutical industry

The Elliptic Curve Digital Signature Algorithm Validation System (ECDSAVS) September 7, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
55Key size / Key / Digital signature / Crypt / Symmetric-key algorithm / Book:Cryptography / Key Wrap / Cryptography / Key management / Public-key cryptography

Random Bit Generation (SP 800-90A, B and C)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:04:04
56Digital signature / Key / RSA / Symmetric-key algorithm / Cryptosystem / Key generation / Book:Cryptography / Cryptography / Public-key cryptography / Key management

Appendix A - Digital Signatures with Public Key Cryptography

Add to Reading List

Source URL: www.occ.treas.gov

Language: English - Date: 2014-10-06 11:45:48
57Certificate policy / Revocation list / X.509 / Certificate authority / Public key infrastructure / Public key certificate / Certification path validation algorithm / Certificate server / Cryptography / Public-key cryptography / Key management

PKI DIGITAL SIGNATURE CERTIFICATE POLICY version as of September 1, 2001 the current version may be found at

Add to Reading List

Source URL: www.azsos.gov

Language: English - Date: 2001-09-07 12:52:06
58Key management / Computer security / Digital signature / Non-repudiation / Public key certificate / Symmetric-key algorithm / Collision attack / Cryptography / Public-key cryptography / Notary

Security Record Kevin Wilson Greg Cannon Jeff Stapleton Anne Wang

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2005-12-08 15:19:37
59NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
60Civil law / Cyberwarfare / Digital signature / Digital Signature Algorithm / Applied mathematics / Public-key cryptography / Cryptography / Elliptic Curve DSA

############################################################## Elliptic Curve Digital Signature Algorithm Curve = P-192 Hash Length = 160 ############################################################## ===================

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:44:02
UPDATE