<--- Back to Details
First PageDocument Content
Key / Symmetric-key algorithm / FIPS 140-2 / Public-key cryptography / Crypt / Cryptographic key types / CRYPTREC / Cryptography / Key management / Cryptography standards
Date: 2013-04-29 15:09:20
Key
Symmetric-key algorithm
FIPS 140-2
Public-key cryptography
Crypt
Cryptographic key types
CRYPTREC
Cryptography
Key management
Cryptography standards

NIST SP[removed]Draft, Recommendation for Crytographic Key Generation

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 571,31 KB

Share Document on Facebook

Similar Documents

Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

DocID: 1lYVJ - View Document

Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

DocID: 1kQ2J - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

DocID: 1klGo - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

DocID: 1jpet - View Document

Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

DocID: 19fDT - View Document