Key authentication

Results: 993



#Item
581Smart card / Authentication / Public key infrastructure / Security token / Hardware security module / Cryptography / Cryptography standards / FIPS 140

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-16 12:15:00
582Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
583Security token / Access token / Key size / Password / Key / Authentication / Transaction authentication number / Token / PKCS / Cryptography / Security / Key management

Microsoft Word - CR-1356_sep25rev.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
584FIPS 140 / Universal Serial Bus / Smart card / Two-factor authentication / PKCS / ISO/IEC / Key size / Advanced Encryption Standard / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Security token

Microsoft Word - WatchKeyUSBToken_SP_20111114.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-17 14:08:00
585FIPS 140 / Smart card / Challenge-response authentication / Critical Security Parameter / Public-key cryptography / Hardware security module / Security of automated teller machines / Cryptography / Computer security / Cryptography standards

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.7 FIPS[removed]Non-Proprietary

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-11-30 00:00:00
586FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
587FIPS 140-2 / Key Wrap / Message authentication code / Key / Advanced Encryption Standard / PKCS / FIPS 140 / Microsoft CryptoAPI / Index of cryptography articles / Cryptography / Cryptography standards / HMAC

Microsoft Word[removed]Mocana Suite B (5 4fm) Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-18 14:19:28
588IEEE standards / Password / Zero-knowledge password proof / Challenge-response authentication / IEEE P1363 / Public-key cryptography / Password-authenticated key agreement / Password manager / Cryptography / Security / Cryptographic protocols

IEEE P1363.2: Password-based Cryptography David Jablon CTO, Phoenix Technologies NIST PKI TWG - July 30, 2003

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
589FIPS 140-2 / FIPS 140 / Digital Signature Algorithm / Authentication / Cryptography / Cryptography standards / Public-key cryptography

0562A238 SGSS FIPS Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
590Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
UPDATE