First Page | Document Content | |
---|---|---|
![]() Date: 2004-09-21 12:04:14Hashing SHA-2 SHA-1 Secure Hash Standard HMAC Crypt Hash function Padding NSA Suite B Cryptography Error detection and correction Cryptographic hash functions Cryptography | Add to Reading List |
![]() | Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash StandardDocID: 1xVjQ - View Document |
![]() | GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface withDocID: 1rud6 - View Document |
![]() | Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00DocID: 1oV1V - View Document |
![]() | SHA-3 Standard: Permutation-Based Hash and Extendable-Output FunctionsDocID: 1lKRk - View Document |
![]() | FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITYDocID: 1lHQo - View Document |