Cryptographic Module Validation Program

Results: 213



#Item
141Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Cryptographic hash functions / Open Source Software Institute / FIPS 140 / SHA-1 / Advanced Encryption Standard / AES implementations / Cryptography standards / Cryptography / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2008-02-10 13:28:55
142SHA-2 / Cryptographic Module Validation Program / SHA-1 / FIPS 140-2 / Digital Signature Algorithm / FIPS 140 / Key size / Transport Layer Security / Triple DES / Cryptography / Cryptography standards / Cryptographic hash functions

Comments Received on the Second Review of SP 800‐131  (Recommendation for the Transitioning of Cryptographic Algorithms and  Key Lengths)  Lovell King II, Dept. of State .............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:29:16
143FIPS 140-2 / Cryptographic Module Validation Program / Cryptographic hash function / FIPS 140 / Transport Layer Security / SHA-2 / Cryptography / Cryptography standards / SHA-1

Received Comments on SP[removed]: Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes David J. Cornwell, Coact ...................................................................................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:46:32
144Computer security / FIPS 140-2 / Crime prevention / National security / FIPS 140 / Critical Security Parameter / Zeroisation / Cryptographic Module Validation Program / Information security / Cryptography / Cryptography standards / Security

FIPS[removed]Draft) Security Requirements for Cryptgoraphic Modules

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-02 13:09:20
145FIPS 140-3 / FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / Trusted Platform Module / Hardware random number generator / AES instruction set / Key size / Zeroisation / Cryptography / Cryptography standards / FIPS 140-2

Legend (type of comment) E = Editorial G = General T = Technical SECTION, SUBSECT

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-02 13:14:00
146Evaluation / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / Federal Information Processing Standard / Information security / National Institute of Standards and Technology / Federal Information Security Management Act / FIPS 140-3 / Cryptography standards / Computer security / Security

Federal Register Notice/Vol 74, No 237/December 11, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-02 13:12:56
147Reference / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Federal Information Processing Standard / National Institute of Standards and Technology / Federal Information Security Management Act / Information security / National Voluntary Laboratory Accreditation Program / Cryptography standards / Computer security / Evaluation

Federal Register Notice/Vol 70, No. 8/January 12, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-02 13:10:28
148Cryptographic Module Validation Program / FIPS 140-3 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Testing Laboratory / SHA-2 / SHA-1 / Common Criteria / Key Wrap / Cryptography standards / Cryptography / FIPS 140-2

Frequently Asked Questions for the Cryptograhic Module Validation Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-05 12:28:51
149Computing / BlackBerry / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / Cryptographic Module Validation Program / BlackBerry OS / Research In Motion / Linux kernel / Cryptography standards / Software / Cryptography

Microsoft Word - BlackBerry_Enterprise_Server_Cryptographic_Kernel_v1.0.2.5…

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
150FIPS 140-2 / FIPS 140 / PKCS11 / Critical Security Parameter / PKCS / Cryptographic Module Validation Program / Hardware security module / Microsoft CryptoAPI / Cryptography standards / Cryptography / Computer security

Microsoft Word - EtkSK -- Security Policy-v1.10.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE