CSRC

Results: 4036



#Item
901Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / FIPS 140-3 / Cryptographic Module Testing Laboratory / National Voluntary Laboratory Accreditation Program / Smart card / Cryptography standards / Cryptography / Computer security

Cryptographic Module Validation Program (CMVP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 14:47:53
902Earthquake / Seismology / Hayward Fault Zone / Cascadia subduction zone / Fault / Geography of California / Plate tectonics / Structural geology

Microsoft PowerPoint - BockDirectorReport.pptx

Add to Reading List

Source URL: csrc.ucsd.edu

Language: English - Date: 2014-01-24 13:09:28
903Computing / Cryptography / Disk encryption / Hardware-based full disk encryption / Trusted Computing Group / FIPS 140-2 / FIPS 140 / Parallel ATA / Trusted Computing / Computer hardware / Cryptography standards / Computer security

Microsoft Word - 9f - Seagate SecureĀ® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 10:58:40
904Cyber-security regulation / Government / National Cable & Telecommunications Association / Computer security / United States Department of Homeland Security / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Public safety

Before the National Institute of Standards and Technology DEPARTMENT OF COMMERCE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
905Cryptographic protocols / FIPS 140-2 / FIPS 140 / Internet standards / SHA-2 / Password / X.509 / SHA-1 / NSA Suite B Cryptography / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 217f - Dell SonicWALL SRA EX9000 Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 10:14:41
906Brocade Communications Systems / 100 Gigabit Ethernet / Toyota MR2 / Network switch / Server hardware / Computer networking / Private transport / Ethernet / Transport

Microsoft Word - Brocade_NetIron_5.6.00aa_Security_Policy_(Brocade_13.12.17_V1.4).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 10:51:11
907Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:38:26
908Cryptographic protocols / FIPS 140-2 / FIPS 140 / Password / SHA-2 / X.509 / Secure communication / Cryptography / Cryptography standards / Computer security

Microsoft Word - 216g - Dell SonicWALL SRA EX6000-7000 SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 10:11:39
90910 Gigabit Ethernet / Brocade Communications Systems / Ethernet / Doublecortin

BrocadeĀ® DCX, DCX[removed], DCX-4S and DCX[removed]Backbones, 6510 FC Switch, 6520 FC Switch and 7800 Extension Switch FIPS[removed]Non-Proprietary

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 10:09:27
910Internet protocols / Data / Secure communication / Hashing / Cryptographic hash functions / HMAC / IPsec / Cipher suite / SHA-1 / Cryptography / Cryptographic protocols / Computing

Microsoft Word - 8e - 4x_RFS7K_Crypto_Module_Security_Policy R1.2.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 16:11:46
UPDATE