FIPS

Results: 2454



#Item
121

FIPS

Add to Reading List

Source URL: files.consumerfinance.gov

Language: English - Date: 2013-12-20 16:45:19
    122

    FIPS Level 3 CertifiedCe rtif

    Add to Reading List

    Source URL: www.istorage-uk.com

    Language: English - Date: 2015-08-09 18:44:01
      123

      Microsoft Word - ISR4431_4451_FIPS_140_2_Security_Policy.docx

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-06-11 12:32:30
        124

        SafeZone FIPS Cryptographic Module Security Policy

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-06-02 14:45:44
          125

                IMS‐FIPS 2015 Abstracts  Rutgers University, New Brunswick, New Jersey 

          Add to Reading List

          Source URL: www.fsrm.rutgers.edu

          Language: English - Date: 2015-06-24 09:30:04
            126Evaluation / Public-key cryptography / Electronic signature / FIPS 140-2 / Digital signature / Common Criteria / Protection Profile / Cryptography / Computer security / CEN Workshop Agreement

            Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

            Add to Reading List

            Source URL: sogis.eu

            Language: English - Date: 2013-02-14 10:21:33
            127Computer security / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / FIPS 140-3 / Zeroisation / Cryptographic Module Testing Laboratory / Federal Information Processing Standard / Critical Security Parameter / Cryptography / Cryptography standards / Security

            FIPS PUBCHANGE NOTICESFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

            Add to Reading List

            Source URL: www.nist.gov

            Language: English - Date: 2012-12-20 11:10:57
            128Espionage / Packaging / Disk encryption / Tamper resistance / Computer security / FIPS 140-2 / IBM / Data security / Encryption / Cryptography / Security / Technology

            Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory An important part of the tutorial will lie in conveying the insights of how practical limitations of

            Add to Reading List

            Source URL: www.sigsac.org

            Language: English - Date: 2008-10-06 10:03:17
            129Hashing / Data Encryption Standard / Finite fields / HMAC / Triple DES / Advanced Encryption Standard / SHA-2 / RSA / CMAC / Cryptography / Message authentication codes / Cryptographic hash functions

            CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

            Add to Reading List

            Source URL: www.ecsec.jp

            Language: English - Date: 2014-09-26 04:10:08
            130Evaluation / Public-key cryptography / FIPS 140-2 / Electronic signature / Common Criteria / Protection Profile / Digital signature / Backup / Cryptography / Computer security / CEN Workshop Agreement

            Microsoft Word - CWA14167-2_with_backup_CMCSOB-PP_v028.doc

            Add to Reading List

            Source URL: sogis.eu

            Language: English - Date: 2013-02-14 10:21:34
            UPDATE