Message authentication code

Results: 79



#Item
61FIPS 140-2 / Zeroisation / Block cipher modes of operation / Symmetric-key algorithm / Initialization vector / Key / Message authentication code / Data Encryption Standard / Cryptography / Key management / Advanced Encryption Standard

Security Policy: Digital Interface Unit Crypto Module (DIU CM) Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-06 00:00:00
62Key management / Cryptographic software / Message authentication code / FIPS 140-2 / Smart card / Security token / Password / FIPS 140 / Key / Cryptography / Cryptography standards / Public-key cryptography

Cryptographic Module Security Policy for the Litronic Industries Argus/300 Document 1 Version 1.5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
63Security / Security token / Smart card / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Message authentication code / Authentication / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-01 14:23:46
64Public-key cryptography / Internet standards / Symmetric-key algorithm / Key Wrap / Key / Message authentication code / Transport Layer Security / Cryptographic hash function / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Cryptographic Key Management Issues & Challenges in Cloud Services

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-15 16:06:45
65Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
66Key / FIPS 140-2 / Symmetric-key algorithm / Message authentication code / Digital Signature Algorithm / Block cipher / Data Encryption Standard / Digital signature / Cryptographic key types / Cryptography / Key management / Public-key cryptography

ITL BULLETIN FOR DECEMBER 2012 GENERATING SECURE CRYPTOGRAPHIC KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC KEY MANAGEMENT AND THE PROTECTION OF SENSITIVE INFORMATION Shirley Radack, Editor Computer Security Division Info

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 13:52:53
67SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
68Key / Symmetric-key algorithm / Probabilistic encryption / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

RZ 3628 (# [removed]Computer Science 16 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:33
69Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
70Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49
UPDATE