SHA-2

Results: 893



#Item
681FIPS 140 / PKCS / Smart card / Security token / ISO/IEC / Zeroisation / SHA-1 / Cryptographic protocol / FIPS 140-3 / Cryptography / Cryptography standards / FIPS 140-2

jForté/HAT Cryptographic Module Security Policy Version 3.3 Litronic, Inc[removed]Cartwright Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
682Error detection and correction / Search algorithms / SHA-2 / SHA-1 / MD5 / Collision / Hash function / Crypt / Digital signature / Cryptography / Cryptographic hash functions / Hashing

Microsoft Word - LE-Hashing-Analysis-WERB-r10.doc

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2006-06-05 17:00:20
683Computing / Cryptography standards / FIPS 140-2 / /dev/random / HP-UX / SHA-2 / PKCS / Cryptlib / CimTrak / Cryptography / Software / Cryptographic software

F-Secure Corporation F-Secure® Cryptographic Library™ FIPS[removed]Validation Security Policy Author: Alexey Kirichenko

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
684FIPS 140-2 / Advanced Encryption Standard / HMAC / FIPS 140 / SHA-2 / Zeroisation / ACE Encrypt / VMware Workstation / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - 1B - ACE Encryption Engine Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-06 00:00:00
685Context-sensitive solutions / American Association of State Highway and Transportation Officials / Federal Highway Administration / Interstate Highway System / Transport / Transportation planning / Design

Highway Brochure for web (Page 2)

Add to Reading List

Source URL: www.sha.state.md.us

Language: English - Date: 2010-06-23 20:00:01
686Cryptography standards / Cryptographic hash functions / Computing / FIPS 140-2 / HMAC / SHA-1 / SHA-2 / FIPS 140 / Windows Mobile / Cryptography / Error detection and correction / Cryptographic software

Mobile Armor™ Crypto Module[removed]Security Policy FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
687FIPS 140-2 / SHA-1 / Whitfield Diffie / FIPS 140 / DES-X / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Cryptographic software

The RSA BSAFE Crypto-C Toolkit Module Security Policy Version 4.11 Page 1 RSA™ BSAFE®

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
688Containers / Bottle / Bottling line / Coca-Cola / Wine bottle / Seam / Technology / Glass bottles / Packaging

2 Fall 2005 Debunking the Myth of the Side Seam Thermometer

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2010-09-30 17:36:56
689Hashing / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / HMAC / FIPS 140 / SHA-2 / SHA-1 / BlackBerry Enterprise Server / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - TID[removed]140sp591.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-08 00:00:00
690Cryptographic hash functions / SHA-2 / United States Department of Housing and Urban Development

SHA COMMUNITY NEWSLETTER Summer 2012 | Volume 12, Issue 3 THE DIRECTORS CHAIR As the HOT summer weather sets in I would like to take this opportunity to bring to all our residents attention the

Add to Reading List

Source URL: www.shanc.org

Language: English - Date: 2013-01-29 14:29:49
UPDATE