<--- Back to Details
First PageDocument Content
Standards / Smart cards / Data security / Authentication / Cryptographic key types / Information security / Subscriber identity module / Middleware / Globally unique identifier / Security / Cryptography / FIPS 201
Date: 2014-05-16 12:40:00
Standards
Smart cards
Data security
Authentication
Cryptographic key types
Information security
Subscriber identity module
Middleware
Globally unique identifier
Security
Cryptography
FIPS 201

1 Revised Draft NIST Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 963,49 KB

Share Document on Facebook

Similar Documents

Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

DocID: 1lYVJ - View Document

Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

DocID: 1kQ2J - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

DocID: 1klGo - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

DocID: 1jpet - View Document

Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

DocID: 19fDT - View Document