CSRC

Results: 4036



#Item
231

Requirements for Elliptic Curves for High-Assurance Applications Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze Background

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-06-11 14:12:57
    232

    1 Simplicity D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-11 14:27:10
      233

      SPYCOS® 3.0 QFN FIPSNonProprietary Security Policy Revision: 1.0 This document may be freely reproduced and distributed whole and intact, including this copyright notice.

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English
        234

        FIPSNon-Proprietary Security Policy

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-06-23 09:39:21
          235

          A Framework for Cooperative Intrusion Detection Deborah Frincke Don Tobin Jesse McConnell Jamie Marconi Dean Polla Center for Secure and Dependable Software Department of Computer Science University of Idaho

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 1998-10-28 00:00:00
            236

            Microsoft Word - ISR4431_4451_FIPS_140_2_Security_Policy.docx

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-06-11 12:32:30
              237

              Microsoft Word - WatchKey ProX USB Token V1.0.2

              Add to Reading List

              Source URL: csrc.nist.gov

              Language: English - Date: 2015-06-23 09:55:48
                238

                SafeZone FIPS Cryptographic Module Security Policy

                Add to Reading List

                Source URL: csrc.nist.gov

                Language: English - Date: 2015-06-02 14:45:44
                  239

                  Microsoft Word - HP TippingPoint OpenSSLSecurity Policy.docx

                  Add to Reading List

                  Source URL: csrc.nist.gov

                  Language: English - Date: 2015-12-21 13:47:54
                    240

                    A Visual Mathematical Model for Intrusion Detection Greg Vert Deborah A. Frincke Jesse C. McConnell

                    Add to Reading List

                    Source URL: csrc.nist.gov

                    Language: English - Date: 1998-10-28 00:00:00
                      UPDATE