Microsoft CryptoAPI

Results: 120



#Item
41smart security interface virtual smart card Logical Access Client for Trusted Platform Modules  Windows, Linux, Mac

smart security interface virtual smart card Logical Access Client for Trusted Platform Modules Windows, Linux, Mac

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:48:12
42New reverse engineering technique using API hooking and sysenter hooking, and capturing of cash card access NetAgent Co., Ltd. http://www.netagent.co.jp Kenji Aiko 

New reverse engineering technique using API hooking and sysenter hooking, and capturing of cash card access NetAgent Co., Ltd. http://www.netagent.co.jp Kenji Aiko 

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:32
43NIST removes cryptography algorithm from random number generator recommendations

NIST removes cryptography algorithm from random number generator recommendations

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-02-26 04:25:01
44Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-13 13:30:44
45The W3C Web Cryptography API: Design and Issues Harry Halpin World Wide Web Consortium/MIT, 32 Vassar Street Cambridge, MA[removed]USA [removed]

The W3C Web Cryptography API: Design and Issues Harry Halpin World Wide Web Consortium/MIT, 32 Vassar Street Cambridge, MA[removed]USA [removed]

Add to Reading List

Source URL: ws-rest.org

Language: English - Date: 2014-04-06 22:09:37
46A Comparison of CDSA to Cryptoki Ruth Taylor ([removed]), National Security Agency February 16, 1999 Keywords: CDSA, Cryptoki, CAPI, port Abstract

A Comparison of CDSA to Cryptoki Ruth Taylor ([removed]), National Security Agency February 16, 1999 Keywords: CDSA, Cryptoki, CAPI, port Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
47

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-29 08:49:50
48Developer-Resistant Cryptography Kelsey Cairns and Graham Steel Abstract “Properly implemented strong crypto systems are one of the few things that you can rely on” - Edward Snowden. So why is mass surveillance so su

Developer-Resistant Cryptography Kelsey Cairns and Graham Steel Abstract “Properly implemented strong crypto systems are one of the few things that you can rely on” - Edward Snowden. So why is mass surveillance so su

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
49Intel® Identity Protection Technology with PKI (Intel® IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May[removed]

Intel® Identity Protection Technology with PKI (Intel® IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May[removed]

Add to Reading List

Source URL: ipt.intel.com

Language: English - Date: 2013-04-09 18:34:52
50Cryptographic Module for CipherCloud Gateway Version 1.0 FIPS[removed]Level 1 Security Policy Version Number: 1.8 Date: August 14, 2014

Cryptographic Module for CipherCloud Gateway Version 1.0 FIPS[removed]Level 1 Security Policy Version Number: 1.8 Date: August 14, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-18 14:40:42