<--- Back to Details
First PageDocument Content
Computer security / Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / FIPS 140-3 / Validation / Common Criteria / National Voluntary Laboratory Accreditation Program / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / Evaluation
Date: 2014-06-05 12:13:01
Computer security
Cryptographic Module Validation Program
FIPS 140-2
FIPS 140
FIPS 140-3
Validation
Common Criteria
National Voluntary Laboratory Accreditation Program
Cryptographic Module Testing Laboratory
Cryptography standards
Cryptography
Evaluation

Cryptographic Module Validation Program Management Manual DRAFT

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 669,83 KB

Share Document on Facebook

Similar Documents

Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

DocID: 1qJrK - View Document

Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

DocID: 1pFYl - View Document

Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

DocID: 1oMM9 - View Document

Computer security / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / FIPS 140-3 / Zeroisation / Cryptographic Module Testing Laboratory / Federal Information Processing Standard / Critical Security Parameter / Cryptography / Cryptography standards / Security

FIPS PUBCHANGE NOTICESFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

DocID: 1gn5P - View Document

Cryptography standards / Computer network security / Data security / National security / FIPS 140-2 / Cloud computing / FIPS 201 / FIPS 140 / Security controls / Computer security / Security / Computing

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1.  Opening Remarks 2.  The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV and PIV-I Us

DocID: 1fyaA - View Document