NSA cryptography

Results: 162



#Item
51Privacy of telecommunications / Mass surveillance / National Security Agency / Signals intelligence / Espionage / NSA warrantless surveillance controversy / Foreign Intelligence Surveillance Act / Telephone tapping / Elliptic curve cryptography / National security / Security / Surveillance

web extra Making Sense of Snowden, Part II: What’s Significant in the NSA Revelations Susan Landau, Google

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2014-01-30 14:23:54
52Cryptographic software / Elliptic Curve DSA / SHA / Key size / Cryptography standards / NSA Suite B Cryptography / SHA-2 / Cryptography / Cryptographic hash functions / SHA-1

Legend for Description Field for Historical FIPS[removed]ECDSA Signature Generation Component Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-08 12:26:15
53Computer security / FIPS 140-2 / Niels Ferguson / National Security Agency / Entropy / Security token / FIPS 140 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Cryptography standards

SPYRUS Encryption Products are Resistant to Attacks on Dual_EC_DRBG Random Number Generation The New York Times recently reported that the NSA may have inserted an intentional "backdoor” weakness in an encryption algor

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2014-01-06 15:57:43
54Galois/Counter Mode / AES instruction set / Q / Coprocessor / NSA Suite B Cryptography / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 14:42:29
55Finite fields / Elliptic curve cryptography / Elliptic curve / Curve / NSA Suite B Cryptography / NIST hash function competition / SHA-2 / Elliptic Curve DSA / Cryptography / Cryptographic hash functions / Mathematics

How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein1,2 , Tung Chou1 , Chitchanok Chuengsatiansup1 , Andreas H¨ ulsing1 , 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 00:04:01
56IEEE 802.11 / Aruba / FIPS 140-2 / Wi-Fi Alliance / Advanced Encryption Standard / FIPS / NSA Suite B Cryptography / Cryptography standards / Cryptography / Aruba Networks

Aruba At A Glance Standards, Government Validations and Accreditations Federal Security Certifications

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2014-04-10 18:42:57
57Cryptography standards / Cryptographic protocols / Computer network security / NSA Suite B Cryptography / Extensible Authentication Protocol / Aruba Networks / IEEE 802.1X / NSA Suite A Cryptography / Cryptographic Modernization Program / Cryptography / National Security Agency / Computing

Advanced Cryptography Module Data Sheet ARUBAOS ADVANCED CRYPTOGRAPHY MODULE

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2011-07-26 11:17:10
58Data security / Encryption / USB flash drive / Laptop / Technology / Information security / Netbook / Cryptography standards / NSA encryption systems / Computing / Cryptography / Security

General Information Technology

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2014-04-21 17:09:40
59Cryptography standards / Key Wrap / Block cipher / Triple DES / Advanced Encryption Standard / Authenticated encryption / Key management / FIPS 140-2 / NSA Suite B Cryptography / Cryptography / Data Encryption Standard / Block cipher modes of operation

Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-01-10 14:24:21
60Cryptographic protocols / Electronic commerce / X.509 / NSA Suite B Cryptography / Elliptic curve cryptography / Elliptic Curve DSA / Revocation list / Public key certificate / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 5759 Category: Informational ISSN: [removed]J. Solinas

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-01-24 14:56:32
UPDATE