Key size

Results: 607



#Item
301Data security / Cassidian / Encryption / Pretty Good Privacy / Key size / Backup / Cryptography / Public-key cryptography / Cryptographic software

Data Security and Encryption Policy Cassidian Communications, Inc. At Cassidian Communications, Inc. (“Cassidian Communications”), we are always conscious and respectful of personal privacy. The following is an over

Add to Reading List

Source URL: www.airbus-dscomm.com

Language: English - Date: 2014-08-02 23:05:09
302Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:38:26
303Internet protocols / Secure communication / Cryptography standards / SHA-2 / HMAC / Secure Shell / Cipher suite / Key size / Key generation / Cryptography / Key management / Cryptographic hash functions

Microsoft Word - 201i - McAfee NSP V7.1 IPS-NAC SecurityPolicy v1.20.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:08:42
304Advanced Encryption Standard process / National Institute of Standards and Technology / Cryptography standards / Data Encryption Standard / LOKI97 / Key size / AES implementations / SAFER / MAGENTA / Cryptography / Advanced Encryption Standard / Block ciphers

Status of the Advanced Encryption Standard (AES) Development Effort James Foti * National Institute of Standards and Technology Keywords: AES, Advanced Encryption Standard, cryptography, encryption.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
305Crime prevention / National security / Computer network security / Key management / ISO standards / FIPS 140-2 / Key size / Information security / Password / Security / Computer security / Cryptography

NETWORK SECURITY FRAMEWORK: ROBUSTNESS STRATEGY Teri Arber, NSA Deb Cooley, NSA Steve Hirsch, NSA Martha Mahan, NSA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
306Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Bruce Schneier / Cryptography / Cipher / SHA-1

Draft revision: ea089c8[removed]:11:44 +0100) Aaron Kaplan Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ul

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
307Design of experiments / Evaluation methods / Hypothesis testing / Psychometrics / Pharmacology / Statistical power / Statistical hypothesis testing / Sample size determination / Experiment / Statistics / Science / Information

Key Elements of Statistical Analyses for Studies with Small Populations (Pediatrics) Pediatric Clinical Investigator Training Lisa A. Kammerman, Ph.D.

Add to Reading List

Source URL: www.fda.gov

Language: English
308Cryptographic software / FIPS 140-2 / Critical Security Parameter / Key Wrap / FIPS 140 / Key size / BitLocker Drive Encryption / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1e - EFJohnson Technologies - Security Policy v5_28.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-10 14:59:55
309MIFARE / Cryptographic software / Key Wrap / Key size / Advanced Encryption Standard / NXP Semiconductors / FIPS 140-2 / FIPS 140 / Block cipher / Cryptography / Cryptography standards / Data Encryption Standard

Microsoft Word - 204d - JN2570-02_SecurityPolicy_v0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-27 10:21:30
310Cryptographic hash functions / FIPS 140-2 / SHA-2 / SHA-1 / Microsoft CryptoAPI / FIPS 140 / Advanced Encryption Standard / Key size / PKCS / Cryptography / Cryptography standards / Cryptographic software

SafeGuard® CryptoServer Se FIPS[removed]Non-Proprietary Security Policy http://hsm.utimaco.com Imprint

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-03 08:19:11
UPDATE