Key Wrap

Results: 102



#Item
61Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
62Wrap / Computing / Cursor / SQL / Insert key

Policy #: Title: Effective Date: 0.000 Enter Policy Title In This Section

Add to Reading List

Source URL: countypolicy.co.la.ca.us

Language: English - Date: 2005-09-15 15:32:42
63Health insurance / United States Department of Defense / Healthcare in the United States / Politics / History of the United States / Humanities / 111th United States Congress / Patient Protection and Affordable Care Act / Presidency of Barack Obama

Key Stakeholder’s N E W S L E T T E R 2013 Wrap Up and Looking Ahead: Letter from the President

Add to Reading List

Source URL: www.mhsindiana.com

Language: English - Date: 2014-04-15 10:21:10
64Cryptography standards / Key Wrap / Block cipher / Triple DES / Advanced Encryption Standard / Authenticated encryption / Key management / FIPS 140-2 / NSA Suite B Cryptography / Cryptography / Data Encryption Standard / Block cipher modes of operation

Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-01-10 14:24:21
65Cryptographic hash functions / Finite fields / Cryptography standards / SHA-2 / Key generation / HMAC / SHA-1 / Key Wrap / Galois/Counter Mode / Cryptography / Message authentication codes / Cryptographic software

Frequently Asked Questions For the Cryptographic Algorithm Validation Program Concerning the Validation of Cryptographic Algorithm Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 16:11:18
66Message authentication codes / Cryptographic software / Key Wrap / Cryptographic hash function / Triple DES / Key generation / Digital signature / CMAC / Key size / Cryptography / Key management / Hashing

NIST’s Cryptographic Toolkit (of Standards and Recommendations)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:12:10
67Business / Competition / Economic theories / Inflation / Materials recovery facility / Futures contract / Financial risk / Economics / Marketing / Pricing

Turning Recyclate into Revenue A short guide for local authorities This summary guide highlights key issues and considerations for local authorities aiming to increase revenue from sales of recyclable materials. The issu

Add to Reading List

Source URL: www.wrap.org.uk

Language: English - Date: 2014-06-18 09:13:46
68Thermoplastics / Dielectrics / Packaging / Business / Polymers / Polyethylene terephthalate / Plastic recycling / Pet food / Flake / Technology / Chemistry / Plastics

Final Report Improving food grade rPET quality for use in UK packaging A summary report on the key factors influencing the quality of food

Add to Reading List

Source URL: www.wrap.org.uk

Language: English - Date: 2013-07-22 03:53:42
69Recycling / Environmental engineering / Materials recovery facility / Kerbside collection / Municipal solid waste / Plastic recycling / Plastic / Waste minimisation / Environment / Waste management / Sustainability

Local authority recycling Recovering value from MRFs A review of key studies relating to the specification, operation and costs of Materials Recovery Facilities

Add to Reading List

Source URL: www.wrap.org.uk

Language: English - Date: 2011-05-12 11:02:04
70Cryptographic Module Validation Program / FIPS 140-3 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Testing Laboratory / SHA-2 / SHA-1 / Common Criteria / Key Wrap / Cryptography standards / Cryptography / FIPS 140-2

Frequently Asked Questions for the Cryptograhic Module Validation Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-05 12:28:51
UPDATE