Back to Results
First PageMeta Content
Cryptographic software / Cryptographic hash functions / Key generation / FIPS 140 / SHA-2 / SHA-1 / Key / Microsoft CryptoAPI / CRYPTREC / Cryptography / Key management / Cryptography standards


Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc
Add to Reading List

Document Date: 2015-01-13 13:30:44


Open Document

File Size: 59,43 KB

Share Result on Facebook

Company

Dell / AES / Proofpoint / CBC / Microsoft / /

Event

FDA Phase / /

Facility

The Proofpoint Security Library The Proofpoint Security Library / PROOFPOINT SECURITY LIBRARY / SECURE OPERATION OF THE PROOFPOINT SECURITY LIBRARY / Cryptographic Key Management The Proofpoint Security Library / Operating System Security The Proofpoint Security Library / /

IndustryTerm

software module / hardware-computing platform / cryptographic services / security products / crypto services / above approved cryptographic algorithms / cryptographic algorithm / /

OperatingSystem

UNIX / Windows XP / Solaris / XP / Linux / Microsoft Windows / Microsoft Vista / /

Organization

European Central Bank / /

Person

Type / /

Position

Crypto Officer / Crypto Officer Services / Role User Crypto Officer / Private / Role Crypto Officer / /

Product

RC2 / SHA-1 / /

ProgrammingLanguage

C++ / /

Technology

Encryption / cryptography / P-192 P-224 P-256 P-384 P-521 Secure Hashing Algorithm / FIPS-approved algorithms / UNIX / Elliptic Curve Digital Signature Algorithm / Linux / API / above approved cryptographic algorithms / private key / OPERATING SYSTEM / RSA Signature Algorithm / following algorithms / 9 2.7 CRYPTOGRAPHIC ALGORITHMS / Digital Signature Algorithm / 2.7 Cryptographic Algorithms / /

URL

http /

SocialTag