Cryptographic Module Testing Laboratory

Results: 195



#Item
51National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ®  TM

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2010-01-22 15:00:38
52NIST HANDBOOK[removed]Edition Nati on al Volu nt ary Labo r atory

NIST HANDBOOK[removed]Edition Nati on al Volu nt ary Labo r atory

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-12 13:35:31
53DEPARTMENT OF COMMERCE National Institute of Standards and Technology National Voluntary Laboratory Accreditation Program ISSUE DATE: February 12, 2015

DEPARTMENT OF COMMERCE National Institute of Standards and Technology National Voluntary Laboratory Accreditation Program ISSUE DATE: February 12, 2015

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-12 11:14:44
54Microsoft Word - CC Part 1

Microsoft Word - CC Part 1

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2012-10-15 09:31:24
55Common Criteria  This brochure was produced by Syntegra on behalf of the Common Criteria Project Sponsoring Organisations

Common Criteria This brochure was produced by Syntegra on behalf of the Common Criteria Project Sponsoring Organisations

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2011-10-24 08:37:47
56Frequently Asked Questions for NIAP Policy #5: 1. Why is this policy being issued? This policy is being issued to help streamline the NIAP evaluation/validation process, help reduce cost, and eliminate redundant activiti

Frequently Asked Questions for NIAP Policy #5: 1. Why is this policy being issued? This policy is being issued to help streamline the NIAP evaluation/validation process, help reduce cost, and eliminate redundant activiti

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-11-04 13:47:52
57Specifying Cryptographic Requirements in Security Targets

Specifying Cryptographic Requirements in Security Targets

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-11-04 13:27:53
58Protection Profile for Mobile Device Fundamentals  Protection Profile for Mobile Device Fundamentals  Version 1.1

Protection Profile for Mobile Device Fundamentals Protection Profile for Mobile Device Fundamentals Version 1.1

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-02-18 15:13:48
59Cryptographic Module Validation Program (CMVP)

Cryptographic Module Validation Program (CMVP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 14:47:53
60Title of Tutorial: Surviving the FIPS[removed]Validation Process Tom Caddy, Brenda Kallighan, Patricia Lareau, InfoGard Laboratories Inc. The Cryptographic Module Validation Program, which tests cryptographic

Title of Tutorial: Surviving the FIPS[removed]Validation Process Tom Caddy, Brenda Kallighan, Patricia Lareau, InfoGard Laboratories Inc. The Cryptographic Module Validation Program, which tests cryptographic

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00