Searching Books & More : "Computer security"

Data encryption (Computer science) X
189 results found in Books & More
RSS
Cover images provided by Open Library

Recommendation for block cipher modes of operation methods and techniques

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography

Published: [Gaithersburg, Md.] : National Institute of Standards and Technology, [2006]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) for confidentiality and authentication

Published: [Gaithersburg, Md.] : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, [2006]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiality

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation the CMAC mode for authentication

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Cryptographic key management workshop summary, June 8-9, 2009

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cryptographic key management workshop summary, June 8-9, 2009 (draft)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

A framework for designing cryptographic key management systems

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guideline for implementing cryptography in the federal government

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, DC : For sale by the Supt. of Docs., U.S. G.P.O., [1999]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for key management Part 1, General (revised)

Published: [Gaithersburg, MD] : National Institute of Standards and Technology, [2007]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for key management Part 1, General (revision 3)

Published: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

A statistical test suite for random and pseudorandom number generators for cryptographic applications

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2000]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

A statistical test suite for random and pseudorandom number generators for cryptographic applications

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) and GMAC

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for key derivation through extraction-then-expansion

Published: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information