Digital Signature Algorithm

Results: 127



#Item
81Biometrics / Gaithersburg /  Maryland / FIPS 201 / Cloud computing / Integrating the Healthcare Enterprise / Digital Signature Algorithm / Biometric Consortium / Iris recognition / Federal Information Processing Standard / Standards / Cryptography / National Institute of Standards and Technology

  Information Technology Laboratory Newsletter INSIDE THIS ISSUE

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-09-03 08:48:38
82Validity / Digital Signature Algorithm / FIPS 140-2 / Validation / Digital signature / SHA-2 / Prime number / Verification and validation / Cryptography / Public-key cryptography / Pharmaceutical industry

The FIPS[removed]Digital Signature Algorithm Validation System (DSA2VS) Updated: May 22, 2014 Previous: September 5, 2013 Original: March 31, 2010

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-22 10:35:11
83Pharmaceutical industry / Validity / Elliptic Curve DSA / Digital signature / FIPS 140-2 / Digital Signature Algorithm / Validation / Verification and validation / Key / Cryptography / Public-key cryptography / Key management

The FIPS[removed]Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-18 16:19:07
84National Institute of Standards and Technology / Federal Information Processing Standard / Digital Signature Algorithm / Security / FIPS 140-3 / FIPS 201 / FIPS 140 / FIPS / Data Encryption Standard / Cryptography / Cryptography standards / Standards

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-11-08 07:43:35
85Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
86Transport Layer Security / Public key infrastructure / Digital signature / Symmetric-key algorithm / Public key certificate / Crypt / Key size / Network Security Services / Certificate server / Cryptography / Public-key cryptography / Key management

Canada Customs Agence des douanes and Revenue Agency et du revenu du Canada Unclassified

Add to Reading List

Source URL: www.cra-arc.gc.ca

Language: English - Date: 2005-10-29 12:08:24
87Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
88Key / FIPS 140-2 / Symmetric-key algorithm / Message authentication code / Digital Signature Algorithm / Block cipher / Data Encryption Standard / Digital signature / Cryptographic key types / Cryptography / Key management / Public-key cryptography

ITL BULLETIN FOR DECEMBER 2012 GENERATING SECURE CRYPTOGRAPHIC KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC KEY MANAGEMENT AND THE PROTECTION OF SENSITIVE INFORMATION Shirley Radack, Editor Computer Security Division Info

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 13:52:53
89Digital Signature Algorithm / Federal Information Processing Standard / Elliptic Curve DSA / Digital signature / FIPS 140 / PKCS / Key size / RSA / FIPS / Cryptography / Public-key cryptography / Cryptography standards

Federal Register / Vol. 78, No[removed]Friday, July 19, [removed]Notices This notice constitutes the antidumping duty order with respect to xanthan gum from the PRC pursuant to section 736(a) of the Act. Interested parties

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2013-07-19 03:02:53
90Biometrics / Identification / Surveillance / Digital signature / Electronic signature / Public key infrastructure / Password / Digital Signature Algorithm / Keystroke dynamics / Cryptography / Public-key cryptography / Key management

Private key generation from on-line handwritten signatures Hao Feng School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2007-07-11 11:43:44
UPDATE