Back to Results
First PageMeta Content
Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction


Document Date: 2014-11-25 17:47:07


Open Document

File Size: 793,06 KB

Share Result on Facebook

City

Adamstown / Newcastle / San Luis Obispo / /

Company

Wind River Systems Inc / EMC / Linus Torvalds / FIPS 140 / HTC / GMAC / CMT Laboratory / Microsoft Corporation / NVIDIA / Citrix / The Module / Dell / AES / OpenSSL Software Foundation Inc. / Oracle / Broadcom / CBC / HP / VMware / Qualcomm / Intel / The Open Group / InfoGard Laboratories / /

Country

United Kingdom / United States / /

/

Event

FDA Phase / /

Facility

CMT Laboratory / Andy Polyakov Chalmers University / /

IndustryTerm

number generation services / software version / system software / target systems / Software integrity / physical media / software library / generation services / cryptographic services / software contact / /

OperatingSystem

Unix / Windows 7 / Ubuntu / Fedora / FreeBSD / Vxworks / Solaris / Microsoft Windows / HP-UX / Mac OS X / XTS / Linux / Android / NetBSD / QNX / PILOT / Windows 2008 / /

Organization

OpenSSL Software Foundation / European Central Bank / Chalmers University of Technology / /

Person

EC DH / Role / Stephen Henson / Andy Polyakov / Tim Hudson / Steve Marquess / /

/

Position

Crypto Officer / Manager / CISSP / Crypto-Officer / Program Manager / Crypto Officer / and otherwise cannot be accessed / /

Product

Microsoft Corporation Portable Audio Device / 1Linux / CSPs / Approved / Approved Cryptographic Functions The Module / Optimizing Compiler Version 16.00 4 uClinux 0.9.29 / Compiler Version 16.00 / HTC Desire Smartphone / 2UNIX / Linux / Microsoft Windows®4Windows / ARMv5 / Compiler 16.00 / Optimizing Compiler 16.00 4 uClinux 0.9.29 / /

ProgrammingLanguage

EC / php / C / C++ / /

ProvinceOrState

California / Maryland / /

Technology

application program interface / Allowed algorithms / Linux / API / Vxworks / Decryption RSA The RSA algorithm / operating system / key encryption / Encryption / Cryptography / Non-Approved Cryptographic Functions These algorithms / Digital Signature / Unix / private key / Android / operating systems / pdf / Dual EC DRBG algorithm / Category Algorithm / Public Key / ASCII / http / 607 Encryption / DSP / /

URL

http /

SocialTag