Guideline for Using Cryptographic Standards in the Federa asymmetric-key algorithm; identity authentication; confidentiality; digital signatures; encryption; integrity; key establishment; message authentication; random bit generation; symmetric-key algorithm
2021-06-04 19:00:13 1.32MB 信息安全 cryptography
1
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
2021-06-04 19:00:13 531KB 信息安全 密钥生成
1
This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the algorithms and key types that may be employed, specifications of the protection that each type of key and other cryptographic information requires and methods for providing this protection, discussions about the functions involved in key management, and discussions about a variety of key-management issues to be addressed when using cryptography. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Part 3 provides guidance when using the cryptographic features of current systems.
2021-06-04 19:00:13 1.61MB 信息安全
1
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.
2021-06-04 19:00:12 677KB 信息安全
1
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in Federal Information Processing Standard (FIPS) 202. KMAC (for KECCAK Message Authentication Code) is a variable-length message authentication code algorithm based on KECCAK; it can also be used as a pseudorandom function. TupleHash is a variable-length hash function designed to hash tuples of input strings without trivial collisions. ParallelHash is a variable-length hash function that can hash very long messages in parallel.
2021-06-04 19:00:12 490KB 信息安全
1
MTK6833 5G 下载工具
2021-06-03 14:00:44 59.45MB MTK6833 5g 单串口下载工具
1
MTK6753 linux版下载工具 SP_Flash_Tool_exe_Linux_v5.1516.00.100.zip
2021-06-03 10:06:59 47.34MB MTK6753
1
亚马逊sp-api 亚马逊sp api java sdk背景: 亚马逊(amazon)在2020年10月推出了新的替代mws的api方案,称为Selling Partner API(SP-API)。sp-api在修改原mws的接口方式的基础上引入了aws的IAM权限管理,增加了开发者的对接门坎和学习成本。这里整理了一份java版的对接信息,供大家借鉴 MWS: 对接的文档介绍document: http://docs.developer.amazonservices.com/en_US/dev_guide/index.html sdk library: https://developer.amazonservices.com/javaclients SP-API(亚马逊销售合作伙伴api): 对接文档介绍document: https://developer.amaz
2021-06-01 14:27:19 1.62MB amazon amazon-web-services mws selling
1
SP 文件查看工具
2021-06-01 09:01:45 4MB SP文件查看工具
1
各种数字信号处理的源码,信号模拟,信号处理 ,Fir iir,fft等
2021-05-30 22:57:21 4.34MB 数字信号处理类库 张明 dsp fir
1