Message authentication codes

Results: 232



#Item
81Computer architecture / Software / Message authentication codes / Hashing / FIPS 140 / HMAC / Vidyo / Zeroisation / Critical Security Parameter / Cryptography standards / Cryptography / Computing

1B - Vidyo Cryptographic Security Kernel Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-20 10:16:00
82Key management / HMAC / Cryptographic hash function / SHA-2 / FIPS 140-2 / Key / Advanced Encryption Standard / Cryptography / Hashing / Message authentication codes

Microsoft Word - 01d - EPCL_Security_Policy_2010-CCS RedlinedD4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
83Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
84Advanced Encryption Standard / FIPS 140-2 / FIPS 140 / Cryptographic software / Critical Security Parameter / HMAC / Zeroisation / Microsoft CryptoAPI / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - Vormetric Security Policy1.05.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-11-26 00:00:00
85Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
86Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
87Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
88Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
89CMAC / Financial regulation / Message authentication codes / International Accounting Standards Board

Microsoft Word - CMACCharter33-1.docx

Add to Reading List

Source URL: www.ifrs.org

Language: English - Date: 2014-07-06 09:24:44
90Electronic authentication / Standards organizations / Message authentication codes / Authentication / National Institute of Standards and Technology / Identity assurance / One-key MAC / Cryptography / Security / Identity management

This DRAFT (NIST Draft SP[removed]document has been approved as FINAL, and has been superseded by the following publication: Publication Number: Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-05 12:30:43
UPDATE