Key size

Results: 607



#Item
441Cryptographic hash functions / Key management / Cryptography standards / HMAC / FIPS 140-2 / Zeroisation / SHA-2 / SHA-1 / Key size / Cryptography / Error detection and correction / Cryptographic software

1B - Crypto-C ME Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
442National Security Agency / Cryptography standards / Computer security / Advanced Encryption Standard / Committee on National Security Systems / Key size / FIPS 140-2 / NSA Suite B Cryptography / Type 3 product / Cryptography / Security / United States government secrecy

FACT SHEET CNSS Policy No. 15, Fact Sheet No. 1 National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information June 2003 Background

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
443Quantum cryptography / Cryptographic protocols / Post-quantum cryptography / Quantum computer / Digital signature / Public key infrastructure / Alice and Bob / Key size / NTRU / Cryptography / Public-key cryptography / Key management

NIST Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-26 13:34:11
444Cryptographic Module Validation Program / FIPS 140 / Key size / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / FIPS 140-2

The CMVP wishes to elicit public comment on the following proposed transition regarding the withdrawal of DES

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
445Consumer electronics / Television technology / Video signal / DIN / S-Video / SCART / VGA connector / Composite video / Video card / Computer hardware / Electronic engineering / Electronics

CHAPTER 1 WELCOME TO GRAND ULTIMATE WIRELESS ! Menu key supports Freeze , Size, Brightness, Contrast, Hue, Saturation,

Add to Reading List

Source URL: www.grandtec.com

Language: English - Date: 2008-02-14 21:22:53
446Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:54:42
447Data Encryption Standard / Advanced Encryption Standard / SHA-2 / FIPS 140-2 / SHA-1 / Key Wrap / Symmetric-key algorithm / Key size / Block cipher / Cryptography / Cryptography standards / Cryptographic hash functions

DISCUSSION PAPER: The Transitioning of Cryptographic Algorithms and Key Sizes 1 Background and Purpose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:50:36
448Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-17 01:00:00
449Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / HMAC / Block cipher / Key size / SHA-1 / Symmetric-key algorithm / Padding / Cryptography / Cryptographic hash functions / Hashing

Cryptolite Security Policy-o.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
450Cryptography standards / Triple DES / National Institute of Standards and Technology / Block cipher / Data Authentication Algorithm / Key size / FIPS 140-2 / Federal Information Processing Standard / Cipher / Cryptography / Data Encryption Standard / Advanced Encryption Standard

FIPS 46-3, Data Encryption Standard (DES)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 12:25:04
UPDATE