Cloud Key Management

1 to 50 of 242 threads (287 total posts)
  Thread Subject Replies Last Post Status
Meeting Minutes 18th May & Reminder 4 tomorrow's WG call!
0 17 hours ago by M B
NIST Revises Special Publications 800-140C and 800-140D for the CMVP
0 4 days ago by Michael Roza
Working group call has started. Feel free to join!
0 6 days ago by M B
Kind reminder of tomorrow's working group call!
0 7 days ago by M B
NIST SP 800-140Br1 ipd DRAFT FOR COMMENT CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
0 12 days ago by Michael Roza
Cancelled is today's call!
0 13 days ago by M B
Kind reminder of tomorrow's working group call
2 13 days ago by M B
Content Reviewers Wanted: Cloud Key Mgmt Training
11 13 days ago by M B
Meeting Minutes 27th April 2022 and 4th May 2022
0 19 days ago by M B
Working group call has started. Feel free to join!
0 20 days ago by M B
Kind reminder of tomorrow's working group call
0 21 days ago by M B
Paper 4
2 26 days ago by Paul Rich
Original post by Michael Born
Working group call has started. Feel free to join!
0 27 days ago by M B
Kind reminder of tomorrow's working group call
0 28 days ago by M B
ISO/IEC 18033-7:2022, Information security - Encryption algorithms- Part 7: Tweakable block ciphers
0 one month ago by Michael Roza
Working group call started. Feel free to join!
0 one month ago by M B
Kind reminder of tomorrow's working group call
0 one month ago by M B
Meeting Minutes 13th April 2022
0 one month ago by M B
Working group call has started. Feel free to join!
0 one month ago by M B
Kind reminder of today's working group call
0 one month ago by M B
In need of a new Co-Chair for the Key Management WG
0 one month ago by M B
NIST Announcement of Proposal to Revise Special Publication 800-38A
0 2 months ago by Michael Roza
Microsoft and Amazon presentations on Cloud HSM
0 2 months ago by M B
Working group call has started. Feel free to join!
0 2 months ago by M B
Reminder: NO working group call today!!!!
0 2 months ago by M B
ISO/IEC 15946-5:2017 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
0 2 months ago by Michael Roza
CSA's Cloud Key Mgmt Short Training
0 2 months ago by M B
Recording of WG call, 2nd March 2022
0 2 months ago by M B
Working group call has started. Feel free to join!
0 2 months ago by M B
2nd part of AWS presentation to start in 40 minutes.
0 2 months ago by M B
Kind reminder of tomorrow's working group call
0 2 months ago by M B
CSA to prepare a short Training Guide on Key Management!!
3 2 months ago by Ivan Pakhomov
Original post by M B
Meeting Minutes: Link to yesterday's (23rd February 2022) WG call recording
2 2 months ago by M B
Working group call has started. Feel free to join!
0 3 months ago by M B
Kind reminder of today's working group call
0 3 months ago by M B
Tomorrow, Wednesday the 23rd, Guest Presentation from Amazon!!!!
0 3 months ago by M B
Working group call today cancelled.
0 3 months ago by M B
Kind reminder of tomorrow's working group call
0 3 months ago by M B
Have contributed to CSA paper and would like to be displayed on artifact page?
0 3 months ago by M B
NIST Second Drafts of NIST SP 800-140C/D Rev. 1 Available for Comment
0 3 months ago by Michael Roza
Working group call has started. Feel free to join!
0 3 months ago by M B
Kind reminder of today's working group call
0 3 months ago by M B
Meeting Minutes 26th January 2022
0 3 months ago by M B
WG call has started
0 3 months ago by M B
Kind reminder of tomorrow's working group call
0 3 months ago by M B
NIST.SP.800-106, Randomized Hashing for Digital Signatures for Comment
0 4 months ago by Michael Roza
NIST.SP.800-22r1a A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Proposal to Review Comments
0 4 months ago by Michael Roza
First Key Mgmt WG call of the year is here!!!!!!
0 4 months ago by M B
First Key Mgmt WG call of the year is here!!!!!!
0 4 months ago by M B
ISO/IEC 27070:2021 Information technology - Security techniques - Requirements for establishing virtualized roots of trust
0 4 months ago by Michael Roza