NSA Suite B Cryptography

Results: 52



#Item
31This DRAFT document has been approved as FINAL, and has been superseded by the following publication: Publication Number:  Special Publication 800-56A Revision 2

This DRAFT document has been approved as FINAL, and has been superseded by the following publication: Publication Number: Special Publication 800-56A Revision 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-13 14:10:05
32Microsoft PowerPoint[removed]Glenn Bell

Microsoft PowerPoint[removed]Glenn Bell

Add to Reading List

Source URL: 1105govinfoevents.com

Language: English - Date: 2014-06-25 12:11:05
33

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:47:04
34

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:50:47
35

PDF Document

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-06-30 09:00:10
36

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:56:13
37

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:48:14
38

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:23
39Comments and Despositions on the May 2013 Draft of Special Publication[removed]

Comments and Despositions on the May 2013 Draft of Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-16 10:38:06
40Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40