Message authentication

Results: 402



#Item
201Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
202Advanced Encryption Standard / FIPS 140-2 / FIPS 140 / Cryptographic software / Critical Security Parameter / HMAC / Zeroisation / Microsoft CryptoAPI / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - Vormetric Security Policy1.05.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-11-26 00:00:00
203Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
204Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
205FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
206FIPS 140-2 / Key Wrap / Message authentication code / Key / Advanced Encryption Standard / PKCS / FIPS 140 / Microsoft CryptoAPI / Index of cryptography articles / Cryptography / Cryptography standards / HMAC

Microsoft Word[removed]Mocana Suite B (5 4fm) Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-18 14:19:28
207Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
208Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
209Cryptographic protocols / Internet privacy / Email authentication / Public key infrastructure / X.509 / Secure messaging / S/MIME / Public key certificate / XKMS / Cryptography / Public-key cryptography / Key management

Improving Message Security With a Self-Assembling PKI Jon Callas Chief Technical and Security Officer 28 April 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:46
210CMAC / Financial regulation / Message authentication codes / International Accounting Standards Board

Microsoft Word - CMACCharter33-1.docx

Add to Reading List

Source URL: www.ifrs.org

Language: English - Date: 2014-07-06 09:24:44
UPDATE