Key size

Results: 607



#Item
451Education in New York / Gilder Lehrman Institute of American History / Lehrman

Original Text: Key Words: In that island also which I have before said we named Espanola, there are mountains of very great size and beauty, vast plains,

Add to Reading List

Source URL: www.gilderlehrman.org

Language: English - Date: 2012-03-26 10:26:34
452Key management / Evaluation / FIPS 140-2 / FIPS 140 / Common Criteria / Key size / Key / Cryptographic Module Testing Laboratory / Hardware security module / Cryptography / Cryptography standards / Computer security

Cryptographic Key Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-06 08:34:59
453Key management / Advanced Encryption Standard / Key size / Secure communication / PKCS / Crypto++ / CRYPTREC / Cryptography / Cryptographic software / Cryptography standards

Cryptographic Transition Strategies

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:47
454Block cipher / Advanced Encryption Standard / Block size / Cipher / Triple DES / Format-preserving encryption / Index of cryptography articles / Cryptography / Key Wrap / Authenticated encryption

Public Comments on the XTS-AES Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:14:46
455EAX mode / Authenticated encryption / OCB mode / Block cipher / Data Encryption Standard / NTRU / Advanced Encryption Standard / Block size / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / CCM mode

Public Comments on Draft Special Publication 800-38C[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:46:32
456Key management / Advantage / Public-key cryptography / CBC-MAC / Block cipher / Cipher / Key size / Tiny Encryption Algorithm / Digital signature forgery / Cryptography / Message authentication codes / Block cipher modes of operation

Related-Key and Key-Collision Attacks Against RMAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:23:34
457Fictional cyborgs / Comics / Block cipher modes of operation / One-key MAC / Block cipher / OCB mode / Authenticated encryption / OMAC / Key size / Cryptography / Message authentication codes / DC Comics

Comments on “On the security of XCBC, TMAC and OMAC” by Mitchell

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:15:29
458Cryptographic Module Validation Program / Elliptic curve cryptography / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key size / SHA-1 / Digital signature / Crypt / Cryptography / Cryptography standards / FIPS 140-2

The Cryptographic Algorithm Validation Program

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:47
459Message authentication codes / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / FIPS 140 / Key size / Cryptographic Module Validation Program / SHA-1 / HMAC / Cryptography / Cryptography standards / Error detection and correction

RSA BSAFE® Crypto-C Micro Edition[removed]FIPS[removed]Validation Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
460Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
UPDATE