NSA cryptography

Results: 162



#Item
111Cryptographic protocols / Electronic commerce / X.509 / NSA Suite B Cryptography / Elliptic curve cryptography / Elliptic Curve DSA / Revocation list / Public key certificate / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-06-30 09:00:10
112Intelligence / Signals intelligence / Military intelligence / Military communications / Traffic analysis / Room 40 / ADFGVX cipher / Central Intelligence Agency / Signals intelligence in modern history / Espionage / National security / Cryptography

UNCLASSIFIED The Origination and Evolution of Radio Traffic Analysis: The World War I Era (b)(3)-P. L[removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-04 19:02:39
113FIPS 140-2 / FIPS 140 / NSA Suite B Cryptography / Internet Key Exchange / Virtual private network / Critical Security Parameter / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography / Cryptography standards / Zeroisation

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:56:13
114FIPS 140-2 / FIPS 140 / NSA Suite B Cryptography / Internet Key Exchange / Critical Security Parameter / Virtual private network / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Zeroisation

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:48:14
115Digital signature / Public-key cryptography / Key / SHA-2 / NSA Suite B Cryptography / CRYPTREC / Cryptography / Cryptographic software / Key management

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:23
116NSA Suite B Cryptography / Elliptic Curve DSA / Cryptography / National Security Agency / Advanced Encryption Standard

Comments and Despositions on the May 2013 Draft of Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-16 10:38:06
117Finite fields / Advanced Encryption Standard / Galois/Counter Mode / Block cipher / Authenticated encryption / NSA Suite B Cryptography / Poly1305-AES / XTR / Transport Layer Security / Cryptography / Message authentication codes / Block cipher modes of operation

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
118Block ciphers / Project 25 / Advanced Encryption Standard / Key size / Cipher / UES / NSA encryption systems / Cryptography / Key management / Data Encryption Standard

Application Note Using the IFR 2975 for Advanced Project 25 Keyloading Capabilities and AES/DES Encryption by Rob Barden

Add to Reading List

Source URL: www.p25.com

Language: English - Date: 2012-12-07 14:19:20
119FIPS 201 / Standards / Key size / Cryptographic hash function / Digital Signature Algorithm / Smart card / Key / CRYPTREC / NSA Suite B Cryptography / Cryptography / Key management / Public-key cryptography

NIST Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-16 13:03:42
120SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
UPDATE