Key size

Results: 607



#Item
341Public-key cryptography / Hashing / Electronic commerce / PKCS / IBM System z10 / RSA / Key size / FIPS 140-2 / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - PKCS11-FIPS-Security-Policy12.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
342Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
343Security token / Access token / Key size / Password / Key / Authentication / Transaction authentication number / Token / PKCS / Cryptography / Security / Key management

Microsoft Word - CR-1356_sep25rev.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
344FIPS 140 / Universal Serial Bus / Smart card / Two-factor authentication / PKCS / ISO/IEC / Key size / Advanced Encryption Standard / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Security token

Microsoft Word - WatchKeyUSBToken_SP_20111114.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-17 14:08:00
345Electronic commerce / Key size / HMAC / Whitfield Diffie / DES-X / SHA-1 / RSA / Zeroisation / Crypto++ / Cryptography / Key management / Cryptographic software

RSA BSAFE Crypto-J[removed]Security Policy JCE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
346Elliptic curve cryptography / HMAC / Whitfield Diffie / FIPS 140-2 / Crypto++ / Network Security Services / Cryptography / Cryptographic software / Key size

RSA BSAFE® Crypto-C Micro Edition for Samsung MFP SW Platform (VxWorks) Security Policy Version[removed]December 3, 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-03 06:34:12
347Design / Computing / Web accessibility / Telecommuting / Information science / Digital workplace / Intranet strategies / Computer networks / Internet privacy / Intranet

How to manage an intranet While every intranet is different depending on the size, type, and culture of the organisation it supports, there are some key principles that are common to intranets that are successful. First,

Add to Reading List

Source URL: markmorrell.files.wordpress.com

Language: English - Date: 2012-02-02 11:34:08
348Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
349Public-key cryptography / Cryptographic hash functions / ISO standards / FIPS 140 / PKCS / Java Card / Gemalto / Key size / SHA-2 / Cryptography / Cryptography standards / Smart cards

Microsoft Word - 4c - D1244115_MultiApp_V3_FIPS_SP_V1.4_add contactless.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-07 16:34:14
350

2015 NMUN•NY Country Assignment Matrix (Size) Updated 19 August 2014 Abbreviation Key l = Member State

Add to Reading List

Source URL: www.nmun.org

Language: French - Date: 2014-09-04 17:36:37
    UPDATE