NSA cryptography

Results: 162



#Item
31Cryptographic software / IEEE P1619 / Block cipher modes of operation / Symmetric-key algorithm / Block cipher / Advanced Encryption Standard / Key / Initialization vector / NSA Suite B Cryptography / Cryptography / Disk encryption / Key management

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31
32Secure communication / Computing / Data / Internet standards / Electronic commerce / Cipher suite / Transport Layer Security / NSA Suite B Cryptography / Elliptic Curve DSA / Cryptographic protocols / Internet protocols / Cryptography

Internet Engineering Task Force (IETF) Request for Comments: 6460 Obsoletes: 5430 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-01-20 18:48:17
33Elliptic curve cryptography / Cryptographic protocols / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key / MQV / Digital signature / Cryptographic Message Syntax / NSA Suite B Cryptography / Cryptography / Public-key cryptography / Key management

Network Working Group Request for Comments: 3278 Category: Informational S. Blake-Wilson D. Brown

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-05-09 20:29:36
34Computing / National Institute of Standards and Technology / FIPS 140-2 / Federal Information Security Management Act / Cryptographic Module Validation Program / NSA Suite B Cryptography / FIPS 140 / Information security / FIPS 140-3 / Cryptography standards / Security / Computer security

Summary of Public Comments on NISTIR[removed]Feb[removed]First) Draft) Based on the draft February 2014 National Institute of Standards and Technology (NIST) publication describing the principles and processes for its work o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-23 13:36:35
35Software / Computer security / Off-the-Record Messaging / Pretty Good Privacy / Hushmail / GNU Privacy Guard / Email encryption / Key server / Public-key cryptography / Cryptography / Cryptographic software / Internet privacy

Encryption Works How to Protect Your Privacy in the Age of NSA Surveillance

Add to Reading List

Source URL: freedom.press

Language: English - Date: 2013-07-03 14:37:15
36Cryptographic software / Cross-platform software / Portable software / Cryptography / Tor / Cypherpunk / Skype / National Security Agency / Pidgin / Software / Internet privacy / Computing

Encryption Works How to Protect Your Privacy in the Age of NSA Surveillance Micah Lee Chief Technology Officer July 2013

Add to Reading List

Source URL: freedom.press

Language: English - Date: 2013-07-02 15:45:30
37Law / Research In Motion / S&P/TSX 60 Index / Term of patent / Patent / Economy of Canada / Elliptic curve cryptography / Reexamination / Civil law / Patent law / United States patent law / Intellectual property law

Serial No. _______________ Effective Date: ___________ Elliptic Curve Cryptography Patent License Agreement Between

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-15 13:07:34
38Cryptographic protocols / FIPS 140-2 / FIPS 140 / Internet standards / SHA-2 / Password / X.509 / SHA-1 / NSA Suite B Cryptography / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 217f - Dell SonicWALL SRA EX9000 Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 10:14:41
39Elliptic curve cryptography / NSA Suite B Cryptography / Key / Public-key cryptography / Diffie–Hellman key exchange / Ephemeral key / Static key / Cryptography / Key management / Elliptic curve Diffie–Hellman

Microsoft Word - SuiteB_Implementer_G#[removed]doc

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-09-22 08:04:55
40Computer security / Electronic commerce / National security / Public key infrastructure / Protection Profile / Public key certificate / FIPS 140-2 / Common Criteria / Entrust / Cryptography / Public-key cryptography / Key management

PANEL SESSION: SECURITY REQUIREMENTS FOR PKIs Panel Chair: Panelists: Alfred W. Arsenault, Jr., NSA Marc LaRoche, Entrust

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE