Back to Results
First PageMeta Content
HMAC / Cryptographic hash function / Cryptographic software / FIPS 140-2 / Key / FIPS 140 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing


Document Date: 2012-12-12 12:59:18


Open Document

File Size: 295,50 KB

Share Result on Facebook

City

Springfield / /

Company

the Commerce Business Daily / /

Facility

National Institute of Standards and Technology / Port Royal Road / Hash Message Authentication Code MAC Message Authentication Code NIST National Institute of Standards and Technology / Information Technology Laboratory / COMPUTER SECURITY Information Technology Laboratory National Institute of Standards and Technology Gaithersburg / FIPS PUB / /

IndustryTerm

Certain cryptographic devices / message authentication algorithm / open computing / cryptographic algorithms / challenge-response identification protocols / Internet RFC / cryptographic algorithm / related telecommunications systems / cryptographic key generation algorithms / /

Organization

National Institute of Standards and Technology / Bureau of Export Administration / Committee on Government Operations / Maintenance Agency / Applicable Federal government / Federal government / Technology Administration / House of Representatives / Institute of Standards and Technology Arden L. Bement / U.S. Department of Commerce / Institute of Standards and Technology Gaithersburg / NIST National Institute of Standards and Technology / Information Technology Laboratory / National Technical Information Service / Approving Authority / Committee on Government Affairs / Senate / /

Person

William Mehuron / Donald L. Evans / Arden L. Bement / Jr. / Philip J. Bond / /

Position

agency head / Director / senior official / Under Secretary / Director SUBCATEGORY / Secretary of Commerce / Secretary / /

Product

ipad / /

ProvinceOrState

Virginia / Maryland / /

PublishedMedium

Public Law / the Commerce Business Daily / /

Technology

message authentication algorithm / CRYPTOGRAPHY / COMPUTER SECURITY Information Technology / Information Technology / Approved cryptographic algorithms / secret key / cryptographic key generation algorithms / HMAC algorithm / challenge-response identification protocols / cryptographic algorithm / /

URL

http /

SocialTag