HMAC

Results: 319



#Item
211Cryptography standards / Cryptographic hash functions / Message authentication codes / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Hashing

BitArmor Secure Cryptographic Engine Version 1.2 Security Policy v 1.1 BitArmor Systems, Inc 401 Liberty Avenue, Suite 1900

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-11 00:00:00
212Advanced Encryption Standard / Cryptographic hash functions / FIPS 140-2 / HMAC / Crypt / SHA-1 / Symmetric-key algorithm / Key size / Microsoft CryptoAPI / Cryptography / Hashing / Cryptographic software

Symantec Cryptographic Module 1.0 FIPS[removed]Non-Proprietary Security Policy 1.0 Symantec Cryptographic Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
213Security / FIPS 140-2 / FIPS 140 / Zeroisation / United States Postal Service / HMAC / Public-key cryptography / Critical Security Parameter / FIPS 140-3 / Cryptography / Cryptography standards / Computer security

Microsoft Word - Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
214Computer security / FIPS 140 / TeamF1 / Secure Shell / Password / Force10 / HMAC / Critical Security Parameter / Access control / Cryptography standards / Computing / Security

Microsoft Word - 01a - Broadmore-SSHield Security Policy _2_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-09-18 01:00:00
215FIPS 140-2 / Advanced Encryption Standard / HMAC / FIPS 140 / SHA-2 / Zeroisation / ACE Encrypt / VMware Workstation / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - 1B - ACE Encryption Engine Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-06 00:00:00
216Cryptography standards / Cryptographic hash functions / Computing / FIPS 140-2 / HMAC / SHA-1 / SHA-2 / FIPS 140 / Windows Mobile / Cryptography / Error detection and correction / Cryptographic software

Mobile Armorâ„¢ Crypto Module[removed]Security Policy FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
217HMAC / Hashing / Key generation / Key / Microsoft CryptoAPI / Index of cryptography articles / Cryptography / Cryptographic software / Key management

BeCrypt Ltd. BeCrypt Cryptographic Library v 2.0 FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-24 00:00:00
218Computer network security / Data / Internet protocols / Cryptography standards / Tunneling protocols / IPsec / FIPS 140-2 / Internet security / HMAC / Computing / Cryptography / Cryptographic protocols

RideWay Station CRYPTOGRAPHIC MODULE SECURITY POLICY

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
219Cryptographic software / HMAC / Hashing / FIPS 140 / SHA-1 / Microsoft CryptoAPI / Cryptography / Cryptography standards / Error detection and correction

Federal Information Processing Standard (FIPS[removed]Design Assurance Level-3 Good Technology, Inc. FIPS Crypto on Windows Mobile Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-10-18 11:36:05
220Hashing / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / HMAC / FIPS 140 / SHA-2 / SHA-1 / BlackBerry Enterprise Server / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - TID[removed]140sp591.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-08 00:00:00
UPDATE