Secure Hash Standard

Results: 51



#Item
1Comments Received in Response to:  Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2017-02-27 12:19:53
2GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2009-10-21 09:08:30
3Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-28 11:33:56
4SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
5FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:33:21
6FIPSchange notice, Secure Hash Standard

FIPSchange notice, Secure Hash Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-18 11:01:04
    7Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

    Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-09-24 10:22:35
    8Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

    Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-12-18 04:58:38
    9FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

    FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

    Add to Reading List

    Source URL: techheap.packetizer.com

    Language: English - Date: 2002-12-15 10:57:16
    10U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

    U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

    Add to Reading List

    Source URL: techheap.packetizer.com

    Language: English - Date: 2002-12-15 10:54:51