HMAC

Results: 319



#Item
161FIPS 140-2 / Key Wrap / Message authentication code / Key / Advanced Encryption Standard / PKCS / FIPS 140 / Microsoft CryptoAPI / Index of cryptography articles / Cryptography / Cryptography standards / HMAC

Microsoft Word[removed]Mocana Suite B (5 4fm) Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-18 14:19:28
162Cryptography standards / Hashing / Cryptographic hash functions / Advanced Encryption Standard / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Cryptographic software

Microsoft Word - 05a - Security_Policy_Model-Open SSL_HP-_Ver1 0r4_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
163Cisco Systems / VoIP phone / Electronic engineering / HMAC / Electronics / Computing / Videotelephony / Cisco Unified Communications Manager

Microsoft Word - Cisco 6921_41_45_61 IP Phones Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-14 15:12:00
164FIPS 140-2 / HMAC / Advanced Encryption Standard / Encrypting File System / IEEE P1619 / Cryptography / Cryptographic software / Cryptography standards

FIPS[removed]Security Policy for Motorola, Inc. The Motorola EMS Cryptographic Library Firmware Module Firmware Component Version:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-17 16:21:00
165PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
166Internet protocols / Cryptographic protocols / Data / Computer network security / Technical terminology / Extensible Threat Management / FIPS 140 / HMAC / Transport Layer Security / Computing / Cryptography / Cryptography standards

Security Policy XTM - V2.1.2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-17 15:39:18
167Elliptic curve cryptography / HMAC / Whitfield Diffie / FIPS 140-2 / Crypto++ / Network Security Services / Cryptography / Cryptographic software / Key size

RSA BSAFE® Crypto-C Micro Edition for Samsung MFP SW Platform (VxWorks) Security Policy Version[removed]December 3, 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-03 06:34:12
168Secure communication / Internet standards / Cryptographic protocols / Internet / Electronic commerce / Transport Layer Security / Secure Shell / HMAC / FIPS 140-2 / Cryptography / Computing / Internet protocols

Microsoft Word - FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 16:52:24
169Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
170SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
UPDATE