CSRC

Results: 4036



#Item
781Advanced Encryption Standard / Key Wrap / Key generation / FIPS 140 / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - 400d - CN16xx-NFBE-SPD-L3-v2.5.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-21 07:02:34
782Hardware security module / FIPS 140 / PKCS / Key generation / HMAC / Key Wrap / SHA-2 / Advanced Encryption Standard / Zeroisation / Cryptography / Cryptography standards / Key management

Ultra Electronics AEP’s Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto Module FIPS[removed]Non-Proprietary Security Policy Issue[removed]Copyright © 2014 Ultra Electronics AEP

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-11 12:59:58
783Computing / FIPS 140-2 / Security token / FIPS 140 / Smart card / Critical Security Parameter / Cryptographic Module Validation Program / Authentication / Cryptography standards / Computer security / Security

1B - Feitien ePass Token - FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-16 12:03:46
784Hardware-based full disk encryption / Cryptography standards / Hard disk drive / Serial ATA / Serial attached SCSI / FIPS 140 / SCSI / Block cipher modes of operation / Trusted Computing Group / Computer hardware / Computing / Disk encryption

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
785Cryptographic software / Cryptographic hash functions / Key generation / FIPS 140 / SHA-2 / SHA-1 / Key / Microsoft CryptoAPI / CRYPTREC / Cryptography / Key management / Cryptography standards

Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-13 13:30:44
786Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
787FIPS 140 / Password / Computing / Cyberwarfare / Security and safety features new to Windows Vista / Security token / Cryptography standards / Computer security / FIPS 140-2

3e Technologies International (3eTI) FIPS[removed]Non-Proprietary Security Policy 3e Technologies International, Inc. FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 01:13:44
788Scientific method / Scientific revolution / Combinatorics / All-pairs testing / Software testing / Science / Charles Sanders Peirce

Automated Combinatorial Testing for Software

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:31:41
789Computing / Firewall / Security / Application firewall / Computer network security / Cyberwarfare / Personal firewall

Security for Telecommuting and Broadband Communications a.k.a. Telecommuting Security Cookbook

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:42:01
790Radio Aurora Explorer / Computer network security / Software testing / Spacecraft / OWASP / Security

Software Fault Interactions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:34:04
UPDATE