HMAC

Results: 319



#Item
101Error detection and correction / Cryptographic hash functions / Advanced Encryption Standard / OpenSSL / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2011-05-12 08:55:47
102SHA-2 / Secure Shell / Password / Cryptographic hash function / Cryptographic software / Hash function / Crypt / Key / Cryptlib / Cryptography / Hashing / HMAC

Why is My App So Slow? (hint – it’s probably MySQL)

Add to Reading List

Source URL: doboard.com

Language: English - Date: 2009-04-24 14:18:17
103Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
104FIPS 140-2 / FIPS 140 / USB flash drive / Cryptographic Module Validation Program / HMAC / Kingston Technology / Password / Universal Serial Bus / Cryptographic hash function / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1g - Kingston DT4000 G2 FIPS[removed]Level 3 Security Policy v1.8.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:47:56
105Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
106Hardware security module / FIPS 140 / PKCS / Key generation / HMAC / Key Wrap / SHA-2 / Advanced Encryption Standard / Zeroisation / Cryptography / Cryptography standards / Key management

Ultra Electronics AEP’s Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto Module FIPS[removed]Non-Proprietary Security Policy Issue[removed]Copyright © 2014 Ultra Electronics AEP

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-11 12:59:58
107Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
108Error detection and correction / Internet protocols / Secure communication / Hashing / Cryptographic protocols / HMAC / Transport Layer Security / SHA-2 / Cryptographic hash function / Cryptography / Cryptographic software / Computing

Microsoft Word - 1l - Accellion Security Policy_Acc_IGL_2014[removed]Accellion response.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:16:41
109Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
110Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / SHA-2 / HMAC / FIPS 140 / Block cipher / Crypto++ / AES implementations / Cryptography / Cryptography standards / Cryptographic software

QTI Cryptographic Module on Crypto 5 Core FIPS[removed]Security Policy Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:48:13
UPDATE