Key Wrap

Results: 102



#Item
81Cryptographic software / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key generation / Pseudorandom number generators / Zeroisation / Key Wrap / HMAC / Cryptography / Cryptography standards / Key management

Microsoft Word[removed]001_Safenet_SecurityPolicy-Rev_D.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-20 09:13:49
82Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
83FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / FIPS 140-3 / Cryptographic Module Testing Laboratory / National Voluntary Laboratory Accreditation Program / SHA-1 / Key Wrap / National Institute of Standards and Technology / Cryptography standards / Cryptography / Computer security

Implementation Guidance for FIPS PUB[removed]and the Cryptographic Module Validation Program National Institute of Standards and Technology Communications Security Establishment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
84Cipher / Key size / Format-preserving encryption / Keystream / Cryptography / Key Wrap / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-06 12:20:24
85Advanced Encryption Standard / FIPS 140-2 / Block cipher modes of operation / Block cipher / IEEE P1619 / Key Wrap / IBM / Cryptography / Cryptography standards / Disk encryption

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-03 09:11:15
86Public-key cryptography / Internet standards / Symmetric-key algorithm / Key Wrap / Key / Message authentication code / Transport Layer Security / Cryptographic hash function / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Cryptographic Key Management Issues & Challenges in Cloud Services

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-15 16:06:45
87Key Wrap / Data Encryption Standard / Verilog / Semiconductor intellectual property core / Cryptography / Electronic engineering / Advanced Encryption Standard

Microsoft Word - AKW1 core.doc

Add to Reading List

Source URL: ipcores.com

Language: English - Date: 2012-03-19 23:00:37
88Public-key cryptography / Tamper resistance / IBM / Key Wrap / Cryptography / Packaging / Security

Secure Vehicle Communication API Attacks on Tamper Resistant Modules Levente Buttyan BME / CrySyS Lab

Add to Reading List

Source URL: www.sevecom.org

Language: English - Date: 2006-09-15 03:35:50
89Key Wrap / Data Encryption Standard / Verilog / Semiconductor intellectual property core / Cryptography / Electronic engineering / Advanced Encryption Standard

Microsoft Word - AKW1 core.doc

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 23:00:37
90Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ยจ

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
UPDATE