Key Wrap

Results: 102



#Item
71Internet protocols / Secure communication / Message authentication codes / Transport Layer Security / Key generation / FIPS 140-2 / FIPS 140 / Key Wrap / Public-key cryptography / Cryptography / Key management / Cryptography standards

Microsoft Word - Kodak Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-24 00:00:00
72Data / Internet protocols / Cryptographic software / Virtual LAN / IPsec / Key Wrap / HP Networking Products / AES implementations / Computing / Ethernet / Network architecture

Datacryptor® 100M Ethernet FIPS[removed]Level 3 Security Policy Firmware Version v5.0 (with MultiPoint license) Hardware Versions 1600X439, Rev. 01, 1600x439, Rev. 02

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-25 08:43:19
73Key management / Cryptographic software / Advanced Encryption Standard / NSA Suite B Cryptography / HMAC / Key Wrap / Key / FIPS 140-2 / Block cipher modes of operation / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - 1e - Mocana Suite B 5.5fs Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-27 16:48:28
74Data Encryption Standard / Advanced Encryption Standard / SHA-2 / FIPS 140-2 / SHA-1 / Key Wrap / Symmetric-key algorithm / Key size / Block cipher / Cryptography / Cryptography standards / Cryptographic hash functions

DISCUSSION PAPER: The Transitioning of Cryptographic Algorithms and Key Sizes 1 Background and Purpose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:50:36
75Critical Security Parameter / FIPS 140-2 / Key management / FIPS 140 / Cryptographic hash function / Key Wrap / Zeroisation / HMAC / Public-key cryptography / Cryptography / Cryptography standards / PKCS

C4CS Security Policy Security Policy for Version 1.2.2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-08-21 01:00:00
76Advanced Encryption Standard / Key Wrap / Block cipher / Authenticated encryption / Triple DES / Message authentication codes / CCM mode / Galois/Counter Mode / Cryptography / Data Encryption Standard / Block cipher modes of operation

SP[removed]Draft, Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 13:08:58
77Cryptographic hash functions / Cryptography standards / Key Wrap / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / BeeCrypt / Crypto++ / Cryptography / Cryptographic software / Hashing

Cryptographic Key Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-06 08:47:36
78Advanced Encryption Standard / FIPS 140 / Key Wrap / Public-key cryptography / SHA-1 / Key / Crypto++ / CRYPTREC / Cryptography / Cryptography standards / Cryptographic software

NIST and US Civilian Agency Cryptography Matthew Scholl Group Manager, Computer Security Division, ITL, NIST Agenda:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-05-11 01:00:00
79Advanced Encryption Standard / FIPS 140 / Key Wrap / Public-key cryptography / SHA-1 / Key / Crypto++ / CRYPTREC / Cryptography / Cryptography standards / Cryptographic software

NIST and US Civilian Agency Cryptography Matthew Scholl Group Manager, Computer Security Division, ITL, NIST Agenda:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-13 01:00:00
80Block cipher / Advanced Encryption Standard / Block size / Cipher / Triple DES / Format-preserving encryption / Index of cryptography articles / Cryptography / Key Wrap / Authenticated encryption

Public Comments on the XTS-AES Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:14:46
UPDATE