HMAC

Results: 319



#Item
201Cryptographic hash functions / Hashing / Advanced Encryption Standard / HMAC / SHA-2 / FIPS 140-2 / OpenSSL / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2009-11-20 10:26:39
202Cryptographic hash functions / Hashing / Espionage / Keccak / Power analysis / HMAC / Side channel attack / Skein / Error detection and correction / Cryptography / NIST hash function competition

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 16:02:00
203NIST hash function competition / Hashing / Message authentication codes / Keccak / SHA-2 / HMAC / SHA-1 / Skein / JH / Error detection and correction / Cryptography / Cryptographic hash functions

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:22:44
204HMAC / Hashing / Key size / FIPS 140 / PKCS / Cryptography / Cryptography standards / Cryptographic software

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-17 00:00:00
205Key management / Hashing / Windows / Microsoft CryptoAPI / CryptGenRandom / HMAC / Key generation / Key / Symmetric-key algorithm / Cryptography / Microsoft Windows / Cryptographic software

Microsoft Word - Windows Server 2003 SP2 - RSAENH security policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-20 00:00:00
206Cryptography standards / Electronic commerce / Key size / HMAC / DES-X / Whitfield Diffie / SHA-1 / RSA / Zeroisation / Cryptography / Key management / Cryptographic software

RSA BSAFE Crypto-J[removed]Security Policy JSAFE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
207Cryptographic hash functions / HMAC / MD5 / CyberGraphX / SHA-1 / Operating system / Public-key cryptography / Cryptography / Error detection and correction / Hashing

Information Resource Engineering Inc. CGX Cryptographic Module Security Policy version 1.24 last revision 24 March 2000

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
208Cryptographic protocols / Electronic commerce / HMAC / Public key certificate / Digital signature / Key-agreement protocol / Key / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
209Cryptographic hash functions / Computing / FIPS 140 / SHA-2 / SHA-1 / HMAC / MD5 / Crypto++ / Error detection and correction / Cryptography / Cryptography standards

FIPS[removed]Non-Proprietary Security Policy Aspen Document Version[removed]Sony Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-21 13:06:22
210Internet protocols / Cryptographic software / Network architecture / Computer network security / Cisco PIX / Network Security Services / IPsec / HMAC / Cisco Systems / Computing / Server appliance / Cryptography

PIX 515-515E Security Policy 7_2 v1_10.fm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-03 00:00:00
UPDATE