Security parameter

Results: 155



#Item
21Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
22FIPS 140 / PKCS / Ciena / Critical Security Parameter / Cryptography standards / Cryptography / FIPS 140-2

Ciena Corporation Ciena 6500 Packet-Optical Platform 4x10G Hardware Version: 1.0 Firmware Version: 1.10 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:26:59
23Hashing / FIPS 140-2 / HMAC / Microsoft CryptoAPI / Advanced Encryption Standard / Critical Security Parameter / FIPS 140 / SHA-2 / Key Wrap / Cryptography / Cryptographic software / Cryptography standards

HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:09:52
24Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
25FIPS 140 / Advanced Encryption Standard / Critical Security Parameter / Key management / Microsoft CryptoAPI / Security of automated teller machines / Cryptography standards / Cryptography / FIPS 140-2

TIDSecurityPolicy (Apricorn_15.04.10_V1.19)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:17:10
26FIPS 140-2 / HMAC / Microsoft CryptoAPI / Critical Security Parameter / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key Wrap / Zeroisation / Cryptography / Cryptographic software / Cryptography standards

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
27Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
28FIPS 140 / Critical Security Parameter / Password / Zeroisation / USB flash drive / Computing / Cyberwarfare / Microsoft CryptoAPI / Cryptography standards / Computer security / FIPS 140-2

Microsoft WordSanDisk Security Policy v1.12 - changes accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-10-16 01:00:00
29Statistics / Bayesian network / Networks / Threat / Parameter / Vulnerability / Cyberwarfare / Computer security / Bayesian statistics

A Bayesian network approach to threat evaluation with application to an air defense scenario

Add to Reading List

Source URL: isif.org

Language: English - Date: 2014-10-02 18:06:47
30Network architecture / Data / Tunneling protocols / Computer network security / IPsec / Security Parameter Index / Host Identity Protocol / Packet Processing / SPI / Internet protocols / Cryptographic protocols / Computing

Network Working Group Request for Comments: 5202 Category: Experimental P. Jokela Ericsson Research NomadicLab

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-04-18 18:59:08
UPDATE