<--- Back to Details
First PageDocument Content
FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key Wrap / National Voluntary Laboratory Accreditation Program / Cryptographic Module Testing Laboratory / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Computer security
Date: 2012-07-23 22:00:42
FIPS 140-2
FIPS 140
Advanced Encryption Standard
Key Wrap
National Voluntary Laboratory Accreditation Program
Cryptographic Module Testing Laboratory
Cryptographic Module Validation Program
Cryptography
Cryptography standards
Computer security

FIPSValidation Certificate No. 1012

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1.006,04 KB

Share Document on Facebook

Similar Documents

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

DocID: 1ujwj - View Document

Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

DocID: 1sMuZ - View Document

Cryptography / Notary / Professional certification / Standards / Public key certificate

COMMONWEALTH OF VIRGINIA Department of Small Business and Supplier Diversity Virginia Employment Service Organization Certification Application Organization Name: Address:

DocID: 1rugH - View Document

Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

DocID: 1rrG7 - View Document

Cryptography / Turing Award laureates / Whitfield Diffie / Phillip Rogaway / Martin Hellman / Joseph Rotblat / National Institute of Standards and Technology / David Chaum / Cypherpunk

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

DocID: 1rqKX - View Document