SHA-2

Results: 893



#Item
481Sha / Set animal

Application To Apply: Complete the application form on Page 2 Include:

Add to Reading List

Source URL: developinghistoryleaderssha.files.wordpress.com

Language: English - Date: 2014-10-27 09:57:52
482FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / IPsec / Hardware random number generator / SHA-2 / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2

FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-24 09:18:16
483Hash list / SHA-1 / Firmware / Crypt / Computer programming / Mathematics / Cryptographic hash functions / Computing / SHA-2

Andrea Gyger From: Sent: To: Cc: Subject:

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-11-01 02:14:41
484Cryptography / Cryptographic hash functions / Internet / Cryptographic protocols / Transport Layer Security / Health Insurance Portability and Accountability Act / SHA-2 / Consent management / SHA-1 / Computing / Internet protocols / Internet standards

Recommended Standards for Privacy and Security Applicable to 2011 Certification Criteria and Meaningful Use HIT Standards Committee Source Documents Used in Creating this Matrix Posted at www.healthit.hhs.gov under the H

Add to Reading List

Source URL: publicaa.ansi.org

Language: English - Date: 2010-01-11 15:49:49
485Cryptographic hash functions / FIPS 140-2 / SHA-2 / SHA-1 / Microsoft CryptoAPI / FIPS 140 / Advanced Encryption Standard / Key size / PKCS / Cryptography / Cryptography standards / Cryptographic software

SafeGuardĀ® CryptoServer Se FIPS[removed]Non-Proprietary Security Policy http://hsm.utimaco.com Imprint

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-03 08:19:11
486Windows XP / GlobalSign / Security token / Electronic commerce / Safenet / Public key certificate / Windows / SHA-2 / Portable Document Format / Cryptography / Computing / Microsoft Windows

Datasheet - English - PDF Signing - Quick Start User Guide V2.ai

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2013-05-24 06:54:08
487Advanced Encryption Standard / FIPS 140-2 / Cryptographic hash functions / FIPS 140 / Cryptographic Module Validation Program / HMAC / Critical Security Parameter / SHA-1 / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - RW-2A - Comtech CMSCrypto Cryptographic Library FIPS[removed]Security Policy Document.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-15 10:00:29
488Internet protocols / Internet standards / Secure communication / FIPS 140-2 / SHA-2 / SHA-1 / Transport Layer Security / Cryptographic Module Validation Program / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: [removed]FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 15:51:49
489SHA-1 / SHA-2 / Virginia State Route 4 / Kentucky Route 9 / Computing / Cryptographic hash functions / CTC / California postmile

CTC Financial Vote List October 8, [removed]Highway Financial Matters Project #

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-09-26 16:40:43
490Cryptographic protocols / Message authentication codes / Hashing / Internet protocols / HMAC / SHA-2 / Cryptographic hash function / Authentication / Label Distribution Protocol / Cryptography / Computing / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7349 Category: Standards Track ISSN: [removed]L. Zheng

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-08-14 14:33:49
UPDATE