NSA Suite B Cryptography

Results: 52



#Item
1Microsoft PowerPoint - preneel_isse15_v1.pptx

Microsoft PowerPoint - preneel_isse15_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2015-11-15 11:53:49
2PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:26:38
3Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-10-18 14:31:43
4Proteus Crypto Module High Assurance Suite A/B Cryptographic Module for Embedded Applications The Proteus Cryptographic Module (PCM) is ideal for programmable embedded applications that require minimal size,

Proteus Crypto Module High Assurance Suite A/B Cryptographic Module for Embedded Applications The Proteus Cryptographic Module (PCM) is ideal for programmable embedded applications that require minimal size,

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
5MYK-185A NSA-Certified Root of Trust Cryptographic Processor for Embedded Applications Advanced cryptographic technology ideal for embedded applications that require minimal size, weight, power, and cost.

MYK-185A NSA-Certified Root of Trust Cryptographic Processor for Embedded Applications Advanced cryptographic technology ideal for embedded applications that require minimal size, weight, power, and cost.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
6Microsoft Word - 5h - IPCryptR2_Security_Policy - MotApproved.R010017.doc

Microsoft Word - 5h - IPCryptR2_Security_Policy - MotApproved.R010017.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:24:44
7fipswith change notice.doc

fipswith change notice.doc

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-09-21 12:04:14
8GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
9DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31
10Internet Engineering Task Force (IETF) Request for Comments: 6460 Obsoletes: 5430 Category: Informational ISSN: [removed]

Internet Engineering Task Force (IETF) Request for Comments: 6460 Obsoletes: 5430 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-01-20 18:48:17