FIPS 140

Results: 916



#Item
111Advanced Encryption Standard / Hashing / Disk encryption / FIPS 140-2 / HMAC / Key size / FIPS 140 / AES instruction set / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-24 07:36:43
112FIPS 140-2 / FIPS 140 / Astro / Zeroisation / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 401f - Astro_Subscriber_MACE_Security_Policy_Level_3_RS.MotAccepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:19:12
113Internet protocols / Internet standards / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / NetBackup / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 11:56:40
114Computer security / Firmware / Safenet / Cryptographic Module Validation Program / Computing / Security / Cryptography standards / FIPS 140-2 / Cisco Catalyst

http://csrc.nist.gov/groups/STM/cmvp/documents140val-all.htm Certificate Number Validation / Posting Date

Add to Reading List

Source URL: istorage-uk.com

Language: English - Date: 2014-02-12 10:26:32
115Security / Common Criteria / Protection Profile / National Information Assurance Partnership / Evaluation Assurance Level / FIPS 140-2 / Lumeta Corporation / Security Target / OpenSSL / Computer security / Evaluation / Computing

Lumeta IPsonar 5.5C The Significance of Common Criteria, Protection Profiles, and Lumeta IPsonar

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2014-06-17 16:24:16
116ISO standards / Ubiquitous computing / Computer security / Security / Contactless smart card / FIPS 140 / ISO/IEC / Card reader / Subscriber identity module / Cryptography / Cryptography standards / Smart cards

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 10:01:24
117Internet protocols / Tunneling protocols / Internet Key Exchange / FIPS 140-2 / IPsec / FIPS 140 / Advanced Encryption Standard / Zeroisation / NSA Suite B Cryptography / Cryptography / Cryptographic protocols / Cryptography standards

Microsoft Word - 5h - IPCryptR2_Security_Policy - MotApproved.R010017.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:24:44
118Aruba Networks / Technology / Wireless LAN / FIPS 140 / Electronic engineering / Wireless access point / IEEE 802.11 / Cryptographic Module Validation Program / Cryptography standards / Wireless networking / Computing

Dell W-AP224 and W-AP225 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSJanuary 26, 2015 This is to advise that the Aruba Networks document entitled “FIPSNon-Propri

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:37
119Wireless networking / Technology / FIPS 140 / Electronic engineering / Wireless access point / Wireless LAN / Computer network security / Cryptography standards / Computing / Aruba Networks

Dell W-IAP3WN, W-IAP3WNP, W-IAP108, W-IAP109, W-AP114, and W-AP115 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSJanuary 26, 2015 This is to advise that the Aruba Networks

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-25 14:29:21
120Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
UPDATE