Narrow your search

Library

KU Leuven (10)

VDIC (7)


Resource type

book (10)


Language

English (10)


Year
From To Submit

2013 (1)

2006 (2)

2005 (1)

1994 (2)

1993 (2)

More...
Listing 1 - 10 of 10
Sort by

Book
Planning for the fiber distributed data interface (FDDI)
Author:
Year: 1993 Publisher: Gaithersburg Department of commerce. National institute of standards and technology

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Security in ISDN
Author:
Year: 1991 Publisher: Gaithersburg Department of commerce. National institute of standards and technology

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
NIST workshop on the computer interface to flat panel displays, January 13-14, 1994
Authors: ---
Year: 1994 Publisher: Gaithersburg Department of commerce. National institute of standards and technology

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Security in ISDN
Authors: ---
Year: 1991 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Electronic authentication guideline : recommendations of the National Institute of Standards and Technology
Authors: ---
Year: 2006 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Planning for the fiber distributed data interface (FDDI)
Authors: ---
Year: 1993 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
NIST workshop on the computer interface to flat panel displays
Authors: --- --- ---
Year: 1994 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Cryptographic algorithms and key sizes for personal identity verification
Authors: --- --- ---
Year: 2005 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

SP 800-78-1 has been modified to enhance interoperability, simplify the development of relying party applications, and enhance alignment with the National Security Agency's Suite B Cryptography [SUITE B]. Revision 1 reduces the set of elliptic curves approved for use with PIV cards and the supporting infrastructure from six curves to two. Also, SHA-384 has been added for use with Curve P-384 in this revision. And finally, this revision eliminates the largest size of RSA keys (3072 bits) on PIV cards. These changes simplify applications that require maximum interoperability: the number of OIDs that must be recognized (e.g., in certificates) has been significantly reduced; and elliptic curve implementations of elliptic curve cryptography can be optimized for operations over two specific curves.


Book
Cryptographic algorithms and key sizes for Personal Identity Verification
Authors: --- --- ---
Year: 2006 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Electronic authentication guideline
Authors: --- --- --- --- --- et al.
Year: 2013 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Authentication. --- Tokens.

Listing 1 - 10 of 10
Sort by