Key size

Results: 607



#Item
461Key management / Elliptic curve cryptography / Digital Signature Algorithm / IEEE P1363 / Elliptic Curve DSA / PKCS / Digital signature / Key size / RSA / Cryptography / Public-key cryptography / Cryptography standards

Development of FIPS 186 Digital Signatures (and Elliptic Curves) Dustin Moody

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:33
462Hashing / Message authentication codes / Cryptographic hash function / Key size / FIPS 140-2 / SHA-2 / Symmetric-key algorithm / Key generation / SHA-1 / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 09:14:27
463Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
464Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
465Pharmacology / Health / Number needed to treat / Multisystemic therapy / Relative risk / Effect size / Medical statistics / Epidemiology / Statistics

2. Research Questions and Key Findings This chapter summarizes major findings structured as the answers to research questions posed by stakeholders and derived from previous MST studies. An effort has been made to presen

Add to Reading List

Source URL: www.lfcc.on.ca

Language: English - Date: 2014-03-31 15:24:53
466Block cipher modes of operation / Block cipher / Block size / Key size / Ciphertext / Cryptographic software / IEEE P1619 / Disk encryption theory / Cryptography / Advanced Encryption Standard / Disk encryption

The XTS-AES Validation System (XTSVS) Updated: September 5, 2013 Previously Updated: March 2, 2011 Original: March 31, 2010 Sharon S. Keller

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-04 14:11:58
467FIPS 140-2 / NIST Special Publication 800-53 / SHA-1 / National Institute of Standards and Technology / Text Retrieval Conference / Key size / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography / Cryptography standards / Cryptographic Module Validation Program

  Information Technology Laboratory Newsletter INSIDE THIS ISSUE

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-10 13:59:40
468Cipher / Key size / Format-preserving encryption / Keystream / Cryptography / Key Wrap / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-06 12:20:24
469Business / Employee benefit / Salary packaging / School voucher / Sodexo / Accor / Voucher / Income tax in the United States / Childcare voucher scheme / Education / Child care / Employment compensation

Childcare Vouchers in the UK Childcare Vouchers in UK 2008 Key data  Market size: £ 700 million issue volume

Add to Reading List

Source URL: www.accor.com

Language: English - Date: 2014-06-18 08:41:50
470Internet protocols / Cryptography standards / Data security / FIPS 140-2 / Information security / Public key infrastructure / Domain Name System Security Extensions / Key size / IPsec / Cryptography / Public-key cryptography / Key management

NIST Special Publication[removed], Recommendation for Key Management Part 3: Application-Specific Key Management Guidance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:05:06
UPDATE