Message authentication

Results: 402



#Item
301Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
302Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
303Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
304Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

NIST SP[removed], Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:36:25
305Email archiving / Message transfer agent / Email privacy / Email authentication / Email / Computer-mediated communication / Computing

Developing a Policy for Managing Email - Publication 84

Add to Reading List

Source URL: www.archives.nysed.gov

Language: English - Date: 2013-09-25 09:44:57
306Hashing / Message authentication codes / Cryptographic hash function / Key size / FIPS 140-2 / SHA-2 / Symmetric-key algorithm / Key generation / SHA-1 / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 09:14:27
307Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
308Security / Security token / Smart card / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Message authentication code / Authentication / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-01 14:23:46
309Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
310Public-key cryptography / Internet standards / Symmetric-key algorithm / Key Wrap / Key / Message authentication code / Transport Layer Security / Cryptographic hash function / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Cryptographic Key Management Issues & Challenges in Cloud Services

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-15 16:06:45
UPDATE