Cryptographic Module Validation Program

Results: 213



#Item
111Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
112Dell PowerConnect / FIPS 140 / Evaluation / Aruba / Reference / FIPS / Cryptographic Module Validation Program / Federal Information Processing Standard / Network of Electoral Democracy / Cryptography standards / Computing / Aruba Networks

Microsoft Word[removed]M3 Security Policy__C4[removed]2013.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-15 17:06:52
113FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / Key Wrap / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / FIPS 140-2

SBFIPSJModule2SecurityPolicy.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-08 00:00:00
114FIPS 140 / Universal Serial Bus / Smart card / Two-factor authentication / PKCS / ISO/IEC / Key size / Advanced Encryption Standard / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Security token

Microsoft Word - WatchKeyUSBToken_SP_20111114.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-17 14:08:00
115FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / FIPS 140-3 / Cryptography standards / Cryptography / FIPS 140-2

Security Builder FIPS Java Module R Versions 2.8 and[removed]FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-09 13:52:00
116FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / SHA-1 / Cryptographic hash function / FIPS 140-3 / IBM / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - ISS GX 4-3 Series FIPS 140 Security Policy v1-6-LegacyGX.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-06 11:54:54
117System software / FIPS 140 / Cryptographic Module Validation Program / Operating system / Loadable kernel module / Server / X Window System / Disk formatting / Cryptography standards / Software / Computing

Sterling Commerce Connect Direct Secure+ Option FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
118Computing / Software / Cryptographic hash functions / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / SHA-2 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-14 15:12:00
119FIPS 140 / Symantec / Zeroisation / Critical Security Parameter / Advanced Encryption Standard / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / FIPS 140-2

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1 FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-07 14:15:44
120Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Key size / Key management / Federal Information Processing Standard / Disk encryption / Information security / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-25 12:06:30
UPDATE