Back to Results
First PageMeta Content
Hashing / SHA-2 / SHA-1 / Secure Hash Standard / HMAC / Crypt / Hash function / Padding / NSA Suite B Cryptography / Error detection and correction / Cryptographic hash functions / Cryptography


fipswith change notice.doc
Add to Reading List

Document Date: 2004-09-21 12:04:14


Open Document

File Size: 236,42 KB

Share Result on Facebook

City

Springfield / /

Company

the Commerce Business Daily / /

Country

United States / /

Facility

National Institute of Standards and Technology / Port Royal Road / Information Technology Laboratory / FIPS PUB / /

IndustryTerm

digital signature algorithms / secure hash algorithms / digital signature algorithm / given algorithm / cryptographic algorithms / hash algorithms / cryptographic devices / secure hash algorithm / keyed-hash message authentication algorithm / signature algorithm / /

Organization

National Institute of Standards and Technology / Bureau of Export Administration / Committee on Government Operations / Maintenance Agency / Applicable Federal government / House of Representatives / U.S. Department of Commerce / Information Technology Laboratory / National Technical Information Service / Approving Authority / Committee on Government Affairs / U.S. Securities and Exchange Commission / Group of Eight / Senate / /

Position

agency head / senior official / Secretary of Commerce / /

ProvinceOrState

Virginia / Maryland / /

PublishedMedium

Public Law / the Commerce Business Daily / /

Technology

1 The SHA-1 algorithm / Cryptography / three algorithms / keyed-hash message authentication algorithm / SHA-1 algorithm / Information Technology / given algorithm / signature algorithm / secure hash algorithm / four secure hash algorithms / Secure hash algorithms / digital signature algorithms / four hash algorithms / 2.2 Algorithm / same algorithm / four algorithms / digital signature algorithm / SHA-512 algorithms / /

URL

http /

SocialTag