SHA-2

Results: 893



#Item
561Cryptographic protocols / Computing / Advanced Encryption Standard / Cryptography standards / Internet protocols / SHA-2 / IPsec / SHA-1 / FIPS 140 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 615j - GGM_8000_Security_Policy 1.14.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:28:11
562United Nations Economic and Social Council / United Nations Development Programme / Development / United Nations / Sha Zukang

Microsoft Word - GPM Agenda-2 Apr_final.doc

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2012-04-10 11:48:13
563Error detection and correction / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-2 / FIPS 140-2 / SHA-1 / Advanced Encryption Standard / Cryptography / Computing / Cryptography standards

Microsoft Word - 01j - 1B - Axway Security Kernel FIPS[removed]Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-12 10:17:29
564Computing / Cryptographic hash functions / Cryptographic software / Internet protocols / Advanced Encryption Standard / SHA-2 / HMAC / FIPS 140-2 / SHA-1 / Cryptography / Error detection and correction / Cryptography standards

Samsung Kernel Cryptographic Module FIPS[removed]Non-Proprietary Security Policy version 1.9 Last Update: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-19 13:05:55
565Software / Unified Extensible Firmware Interface / Rootkit / Windows 8 / Insyde Software / Personal computer hardware / SHA-2 / BIOS / System software / Computing

presented by UEFI Security Enhancements UEFI Fall Plugfest – October 24-27, 2011 Presented by Kevin Davis (Insyde Software) Updated[removed]

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-25 13:00:28
566NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
567Cryptographic software / Internet protocols / Secure communication / Cryptographic protocols / Open Source Tripwire / Cipher suite / HMAC / PKCS / SHA-2 / Cryptography / Cryptography standards / Computing

Tripwire Cryptographic Module FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-07 08:37:23
568Cryptographic Module Validation Program / Advanced Encryption Standard / FIPS 140 / Key size / SHA-2 / Key management / Federal Information Processing Standard / Information security / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-007

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-25 12:06:25
569Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
570Cryptographic hash functions / Advanced Encryption Standard / Internet protocols / Cryptographic software / IPsec / Internet Key Exchange / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptographic protocols

Microsoft Word - 626g - S6000 Security Policy 2.9.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:31:34
UPDATE