Back to Results
First PageMeta Content
Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards


NIST Cryptographic Standards and Guidelines Development Program Briefing Book
Add to Reading List

Document Date: 2014-07-10 13:14:41


Open Document

File Size: 815,98 KB

Share Result on Facebook

Company

GMAC / Virtual Private Networks / AES / Guidelines Development Program Briefing Book Cryptographic Technology Group / Cryptographic Technology Group / NIST Computer Systems Laboratory / /

Country

United States / /

Event

FDA Phase / /

Facility

NIST Computer Systems Laboratory / /

IndustryTerm

government telecommunications / digital signature algorithms / digital signature algorithm / hash algorithms / classified encryption/decryption algorithm / non-national security systems / hash algorithm / communication protocols / risk management / encryption devices / secure applications / /

OperatingSystem

XTS / /

Organization

Committee of Visitor / U.S. government / Department of Commerce / /

Person

Xiaoyun Wang / /

Position

President / Major / General / Secretary of Commerce / Secretary / Undersecretary of Commerce / /

Product

Cryptographic Toolkit / SHA-1 / /

ProgrammingLanguage

EC / /

Technology

Encryption / Cryptography / hash algorithm / specifying algorithms / formerly classified encryption/decryption algorithm / Transport Layer Security protocol / seven approved hash algorithms / 64-bit processors / Block Cipher / hash algorithms / SHA algorithm / digital signature algorithms / Public Key Infrastructure technology / SKIPJACK algorithm / communication protocols / Digital Signature / SHA hash algorithm / digital signature algorithm / /

URL

http /

SocialTag