HMAC

Results: 319



#Item
71FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / HMAC / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography standards / Cryptography / Computer security

FIPS[removed]Validation Certificate No. 1031

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 21:45:35
72FIPS 140 / Advanced Encryption Standard / HMAC / Key Wrap / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography / Cryptography standards / FIPS 140-2

FIPS[removed]Validation Certificate No. 1037

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 21:37:00
73FIPS 140 / Advanced Encryption Standard / HMAC / Key Wrap / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography / Cryptography standards / FIPS 140-2

FIPS[removed]Validation Certificate No. 958

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-26 11:53:45
74FIPS 140 / SHA-2 / HMAC / SHA-1 / PKCS / Advanced Encryption Standard / Network Security Services / FIPS 140-3 / Cryptography / Cryptography standards / FIPS 140-2

FIPS[removed]Validation Certificate No. 1092

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-22 21:51:47
75Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
76Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
77Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 Jan[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-03-02 04:20:28
78Advanced Encryption Standard / Cryptographic software / FIPS 140-2 / FIPS 140 / Block cipher modes of operation / HMAC / Zeroisation / Crypto++ / AES implementations / Cryptography / Cryptography standards / Message authentication codes

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49
79HMAC / Hashing / Cryptographic Module Validation Program / PKCS / Advanced Encryption Standard / Network Security Services / Microsoft CryptoAPI / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - SYMC DLP FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-26 13:21:42
80Computer security / Cryptographic software / Virtual LAN / Critical Security Parameter / Password / FIPS 140 / HMAC / SHA-1 / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - 3e-636M-HSE FIPS Security Policy version 1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-11 11:28:45
UPDATE