Key generation

Results: 481



#Item
401Windows / Hashing / Microsoft CryptoAPI / Key generation / Key / Transport Layer Security / Public-key cryptography / Symmetric-key algorithm / Data Protection API / Cryptography / Cryptographic software / Key management

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
402Key management / Cryptographic software / FIPS 140-2 / FIPS 140 / HMAC / Cryptographic Service Provider / Key generation / Zeroisation / Critical Security Parameter / Cryptography / Cryptography standards / Hashing

F-Secure Cryptographic Service Provider Security Policy 1 F-Secure Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
403Cryptography / Software token / Access token / Key generation / Cyberwarfare / Hardware security module / PKCS11 / Key management / Security / Computer security

nFast Cryptographic accelerators security policy nFast Cryptographic accelerators security policy nFast 75/CA-00, nFast 150/CA-00, nFast 300/CA-00 Purpose The nFast accelerator is a multi-tasking hardware accelerator th

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
404Key / Symmetric-key algorithm / FIPS 140-2 / Public-key cryptography / Crypt / Cryptographic key types / CRYPTREC / Cryptography / Key management / Cryptography standards

NIST SP[removed]Draft, Recommendation for Crytographic Key Generation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:09:20
405Cryptographic software / Microsoft CryptoAPI / Key generation / Key / Crypt / Public-key cryptography / Symmetric-key algorithm / Hash function / Password / Cryptography / Key management / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
406Cyberwarfare / Security / Computer security / Key generation / NForce / Access token / Key / Public-key cryptography / Software token / Key management / Cryptography / Nvidia

The nForce security policy nForce 300, nForce 150, nForce 75 nCipher Date:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
407Next Generation 9-1-1 / Public-safety answering point / 9-1-1 / Interoperability / Intrado / Computer-aided dispatch / Emergency service / National Telecommunications and Information Administration / Enhanced 9-1-1 / Telephony / Public safety / Management

WORKING GROUP 1A Key Findings and Effective Practices for Public Safety Consolidation Final Report October 2010 The Communications Security, Reliability and Interoperability Council

Add to Reading List

Source URL: www.tsag-its.org

Language: English - Date: 2010-11-30 17:39:49
408Federal Aviation Administration / Next Generation Air Transportation System / Air traffic control / Airport / Southwest Airlines / Air Traffic Organization / Metron Aviation / Aviation / Transport / Electronic navigation

Key Issues for Reauthorizing the Federal Aviation Administration

Add to Reading List

Source URL: www.oig.dot.gov

Language: English
409Surveillance / Identification / Integrated Automated Fingerprint Identification System / Public key fingerprint / Automated fingerprint identification / Personally identifiable information / Federal Bureau of Investigation / Next Generation Identification / Biometrics / Fingerprints / Security

Electronic Questionnaires for Investigations Processing (e-QIP)

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-30 14:52:08
410Cryptographic software / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key generation / Pseudorandom number generators / Zeroisation / Key Wrap / HMAC / Cryptography / Cryptography standards / Key management

Microsoft Word[removed]001_Safenet_SecurityPolicy-Rev_D.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-20 09:13:49
UPDATE