HMAC

Results: 319



#Item
171Hashing / BlackBerry / Embedded operating systems / Smartphones / FIPS 140-2 / BlackBerry OS / FIPS 140 / HMAC / SHA-2 / Cryptography / Computing / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-11-30 00:00:00
172FIPS 140 / NSA Suite B Cryptography / HMAC / Elliptic curve cryptography / Advanced Encryption Standard / Key generation / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - C3m_software_SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-29 10:31:00
173Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
174Computing / Cryptographic hash functions / Cryptographic software / Internet protocols / Advanced Encryption Standard / SHA-2 / HMAC / FIPS 140-2 / SHA-1 / Cryptography / Error detection and correction / Cryptography standards

Samsung Kernel Cryptographic Module FIPS[removed]Non-Proprietary Security Policy version 1.9 Last Update: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-19 13:05:55
175Cryptographic software / Internet protocols / Secure communication / Cryptographic protocols / Open Source Tripwire / Cipher suite / HMAC / PKCS / SHA-2 / Cryptography / Cryptography standards / Computing

Tripwire Cryptographic Module FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-07 08:37:23
176Cryptographic hash functions / Advanced Encryption Standard / Internet protocols / Cryptographic software / IPsec / Internet Key Exchange / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptographic protocols

Microsoft Word - 626g - S6000 Security Policy 2.9.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:31:34
177International Space Station / Hospital incident command system / Spaceflight / Staff / Incident Command System

Staffing Overview This staffing model is an example. Depending on the event positions may be combined, eliminated, or managed by KCMEO, HMAC, or the EOC. Not all staff positions will be active during specific timelines o

Add to Reading List

Source URL: www.apctoolkits.com

Language: English - Date: 2012-08-13 17:27:07
178Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
179Environment / Fisheries science / Anthozoa / Fishing industry / Ecosystems / Coral / Fisheries management / Federal Register / Exclusive economic zone / Fishing / Coral reefs / Physical geography

[removed]Federal Register / Vol. 60, No[removed]Tuesday, October 17, [removed]Proposed Rules from the Hazardous Materials Advisory Council (HMAC) seeking an extension

Add to Reading List

Source URL: www.safmc.net

Language: English - Date: 2013-08-21 21:53:55
180Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
UPDATE