1![Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2 Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2](/pdf-icon.png) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2016-07-27 10:26:48
|
---|
2![Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature](/pdf-icon.png) | Add to Reading ListSource URL: www.spyrus.comLanguage: English - Date: 2015-08-05 12:42:41
|
---|
3![USB / Public-key cryptography / Smart cards / Aloaha / PKCS / Encrypting File System / Cryptographic Service Provider / Microsoft CryptoAPI / Card reader / Cryptography / Microsoft Windows / Cryptographic software USB / Public-key cryptography / Smart cards / Aloaha / PKCS / Encrypting File System / Cryptographic Service Provider / Microsoft CryptoAPI / Card reader / Cryptography / Microsoft Windows / Cryptographic software](/pdf-icon.png) | Add to Reading ListSource URL: www.aloaha.comLanguage: English - Date: 2013-01-02 04:25:56
|
---|
4![Microcontrollers / EEPROM / Microsoft CryptoAPI / Computing / Computer memory / Computer hardware / I²C Microcontrollers / EEPROM / Microsoft CryptoAPI / Computing / Computer memory / Computer hardware / I²C](/pdf-icon.png) | Add to Reading ListSource URL: www.insidesecure.comLanguage: English |
---|
5![Security / ISO standards / Ubiquitous computing / Windows XP / Single sign-on / Cryptographic Service Provider / Microsoft CryptoAPI / Card reader / Windows 8 / Microsoft Windows / Computing / Smart cards Security / ISO standards / Ubiquitous computing / Windows XP / Single sign-on / Cryptographic Service Provider / Microsoft CryptoAPI / Card reader / Windows 8 / Microsoft Windows / Computing / Smart cards](/pdf-icon.png) | Add to Reading ListSource URL: library.secmaker.comLanguage: English - Date: 2015-02-17 08:55:38
|
---|
6![Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security](/pdf-icon.png) | Add to Reading ListSource URL: corex.atLanguage: English - Date: 2015-05-13 12:15:10
|
---|
7![Hashing / FIPS 140-2 / HMAC / Microsoft CryptoAPI / Advanced Encryption Standard / Critical Security Parameter / FIPS 140 / SHA-2 / Key Wrap / Cryptography / Cryptographic software / Cryptography standards Hashing / FIPS 140-2 / HMAC / Microsoft CryptoAPI / Advanced Encryption Standard / Critical Security Parameter / FIPS 140 / SHA-2 / Key Wrap / Cryptography / Cryptographic software / Cryptography standards](/pdf-icon.png) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-22 08:09:52
|
---|
8![Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security](/pdf-icon.png) | Add to Reading ListSource URL: www.corex.atLanguage: English - Date: 2015-05-13 12:15:10
|
---|
9![Ubiquitous computing / Computing / Cryptography / Card reader / USB / ISO/IEC / Microsoft CryptoAPI / Biometrics / Contactless smart card / Smart cards / Security / ISO standards Ubiquitous computing / Computing / Cryptography / Card reader / USB / ISO/IEC / Microsoft CryptoAPI / Biometrics / Contactless smart card / Smart cards / Security / ISO standards](/pdf-icon.png) | Add to Reading ListSource URL: www.privaris.comLanguage: English - Date: 2008-03-16 22:09:31
|
---|
10![FIPS 140 / Advanced Encryption Standard / Critical Security Parameter / Key management / Microsoft CryptoAPI / Security of automated teller machines / Cryptography standards / Cryptography / FIPS 140-2 FIPS 140 / Advanced Encryption Standard / Critical Security Parameter / Key management / Microsoft CryptoAPI / Security of automated teller machines / Cryptography standards / Cryptography / FIPS 140-2](/pdf-icon.png) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-21 10:17:10
|
---|