FIPS

Results: 2454



#Item
81Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / SHA-1 / National Institute of Standards and Technology / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:48:48
82Signature / Public-key cryptography / Cryptography standards / Computer law / Key management / Public key certificate / Authentication / Digital signature / Electronic signature / Qualified electronic signature / RSA SecurID / FIPS 140-2

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-02-05 10:51:00
83Side-channel attacks / EMV / Power analysis / FIPS 140 / Differential fault analysis / Smart card / Data Encryption Standard / Conventional PCI

Side Channel Attacks CC, FIPS, EMV and PCI points of view SeptemberICCC Turkey 1

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-09-02 02:33:50
84Cryptography standards / Cryptographic hash functions / Cryptography / FIPS 140-2 / FIPS 140 / SHA-2 / SHA-1 / Cryptographic Module Validation Program / Advanced Encryption Standard / Secure Hash Algorithm / Data Encryption Standard

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-28 11:33:56
85Hoboken /  New Jersey / Stevens Institute of Technology / V-12 Navy College Training Program / United States Merchant Marine Academy / Remotely operated underwater vehicle / United States Merchant Marine

CSR Newsletter September 2012

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2015-08-26 11:29:56
86Law enforcement in the United States / United States Department of Homeland Security / Transportation Security Administration / U.S. Immigration and Customs Enforcement / Homeland security / Port security / Homeland Security Centers of Excellence / Federal Air Marshal Service / United States Coast Guard / Erroll Southers / Arif Alikhan

National Center for Risk and Economic Analysis of Terrorism Events (CREATE) A DHS Science and Technology Center of Excellence University of

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-06 11:16:24
87Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
88Cryptographic protocols / Key management / Internet protocols / IPsec / Cryptography / Internet Key Exchange / DiffieHellman key exchange / Password / Key / FIPS 140-2 / Block cipher mode of operation / Transport Layer Security

Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:30:24
89Ubiquitous computing / ISO standards / Smart cards / Access control / Computer access control / Contactless smart card / FIPS 201 / Card reader / Biometric passport / Proximity card / Radio-frequency identification / ISO/IEC 14443

Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger IBM Research Division, Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598, USA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 07:57:52
90Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
UPDATE