NSA cryptography

Results: 162



#Item
11Computing / Public key certificate / Software / Windows / Microsoft Outlook / Computer architecture / Certificate policy / X.509 / Public-key cryptography / Key management / Revocation list

UNCLASSIFIED Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-10-20 12:38:28
12Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-10-18 14:31:43
13Shakespeare authorship question / William F. Friedman / Cryptanalysis / Lambros D. Callimahos / David Kahn / National Security Agency / The Codebreakers / SIGABA / Aegean Park Press / Cryptography / Espionage / Riverbank Laboratories

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2015-04-20 07:42:08
14Cryptography standards / Fill device / Electronic Key Management System / KSD-64 / NSA Suite B Cryptography / FIPS 140-2 / Cryptography / National Security Agency / Key management

Proteus Crypto Module High Assurance Suite A/B Cryptographic Module for Embedded Applications The Proteus Cryptographic Module (PCM) is ideal for programmable embedded applications that require minimal size,

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
15Computing / NSA Suite B Cryptography / National Security Agency / ARM architecture

MYK-185A NSA-Certified Root of Trust Cryptographic Processor for Embedded Applications Advanced cryptographic technology ideal for embedded applications that require minimal size, weight, power, and cost.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
16Crypt / SHA-1 / BATON / Key generation / Cryptographic software / NSA cryptography / SHA-2 / Cryptography / Key management / Cryptographic hash functions

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
17Key size / Cryptosystem / Encryption / Data Encryption Standard / Key / Smart card / Symmetric-key algorithm / NSA encryption systems / Network Security & Cryptography / Cryptography / Key management / Public-key cryptography

PIN Security Requirements

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:44
18Internet protocols / Tunneling protocols / Internet Key Exchange / FIPS 140-2 / IPsec / FIPS 140 / Advanced Encryption Standard / Zeroisation / NSA Suite B Cryptography / Cryptography / Cryptographic protocols / Cryptography standards

Microsoft Word - 5h - IPCryptR2_Security_Policy - MotApproved.R010017.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:24:44
19Hashing / SHA-2 / SHA-1 / Secure Hash Standard / HMAC / Crypt / Hash function / Padding / NSA Suite B Cryptography / Error detection and correction / Cryptographic hash functions / Cryptography

fipswith change notice.doc

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-09-21 12:04:14
20National Security Agency / Mass surveillance / Crime prevention / Law enforcement / Surveillance / Cryptography / Cipher / NSA warrantless surveillance controversy / Russ Tice / National security / Security / Espionage

  Big  Data  and  Mass  Surveillance   Dr.  Paul  J.  Ennis,  Trinity  College  Dublin     Big  Data  is  one  of  those  terms  that  comes  along  eve

Add to Reading List

Source URL: www.fact.co.uk

Language: English - Date: 2015-02-19 11:50:52
UPDATE