Federal Inf. Process. Stds. (NIST FIPS)

Security Requirements for Cryptographic Modules

March 22, 2019
Author(s):
Michael J. Cooper, Kim B. Schaffer
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate...

Secure Hash Standard

August 04, 2015
Author(s):
Quynh H. Dang
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed...

Digital Signature Standard (DSS)

July 19, 2013
Author(s):
Elaine B. Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized...

Secure Hash Standard (SHS)

March 06, 2012
Author(s):
Quynh H. Dang
[Superseded by FIPS 180-4 (August 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919060] This standard specifies hash algorithms that can...

Digital Signature Standard (DSS)

June 25, 2009
Author(s):
Elaine B. Barker
[Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that...

Secure Hash Standard (SHS)

October 31, 2008
Author(s):
Elaine B. Barker, Quynh H. Dang
[Superseded by FIPS 180-4 (March 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910977] This standard specifies five hash algorithms that...

The Keyed-Hash Message Authentication Code (HMAC)

July 16, 2008
Author(s):
Quynh H. Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be...

Pages