Key Wrap

Results: 102



#Item
51Key Wrap / Block cipher

############################################################## Block Cipher Modes of Operation Methods for Key Wrapping

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-05 08:32:35
52PKCS / FIPS 140-2 / FIPS 140 / Key Wrap / SHA-2 / HMAC / Advanced Encryption Standard / Cryptographic Module Validation Program / SHA-1 / Cryptography / Cryptography standards / Network Security Services

Microsoft Word - Security_ Policy_Wind_River_NSS_0801.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
53Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
54FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / Key Wrap / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / FIPS 140-2

SBFIPSJModule2SecurityPolicy.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-08 00:00:00
55FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
56FIPS 140-2 / Key Wrap / Message authentication code / Key / Advanced Encryption Standard / PKCS / FIPS 140 / Microsoft CryptoAPI / Index of cryptography articles / Cryptography / Cryptography standards / HMAC

Microsoft Word[removed]Mocana Suite B (5 4fm) Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-18 14:19:28
57Cryptographic protocols / Internet protocols / Secure communication / Password / Public-key cryptography / Key Wrap / Ssh-keygen / OpenSSH / Cryptography / Secure Shell / Internet standards

Microsoft Word - 29a - CM180D Security Policy - MJI changes _2_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-24 00:00:00
58Cryptographic protocols / Internet protocols / Secure communication / Password / Public-key cryptography / Key Wrap / Ssh-keygen / OpenSSH / Cryptography / Secure Shell / Internet standards

Microsoft Word - 01d - CM140T Security Policy_InfoGard - MJI changes _2_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-24 00:00:00
59Key size / Key / Digital signature / Crypt / Symmetric-key algorithm / Book:Cryptography / Key Wrap / Cryptography / Key management / Public-key cryptography

Random Bit Generation (SP 800-90A, B and C)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:04:04
60Block cipher modes of operation / CMAC / Key Wrap / Block cipher / Ciphertext / Triple DES / Advantage / Cryptography / Message authentication codes / Finite fields

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
UPDATE