Back to Results
First PageMeta Content
Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols


Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................
Add to Reading List

Document Date: 2012-05-07 11:54:42


Open Document

File Size: 1,09 MB

Share Result on Facebook

Company

ICSA Labs. / AES / Security Technology Group / TCS Innovation Labs / /

/

Event

FDA Phase / /

IndustryTerm

bank / cryptographic algorithms / signature algorithms / hash algorithm / symmetric algorithms / cryptogrphic algorithms / security protocols / /

Organization

US Federal Government / /

Person

Paul Hoffman / Stan Kladko / Hugo Krawczyk / Robert Reiter / Debby Wallner / Athena Smartcard / Ian Simmons / Kim Schaffer / David McGrew / /

Position

administrator / analyst / Engineer / /

Product

FIPS / SHA-1 / /

Technology

encryption / hash algorithm / VPN / wireless 802.11i protocol / security protocols / private key / IETF protocols / signature algorithms / approved algorithms / /

SocialTag