Zeroisation

Results: 106



#Item
1Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-15 09:06:22
2Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-03-09 11:24:03
3Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-26 14:51:24
4Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-08-02 22:30:34
5Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
6Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-04-29 19:57:45
7Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

Add to Reading List

Source URL: bouncycastle.org

Language: English
8Computer security / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / FIPS 140-3 / Zeroisation / Cryptographic Module Testing Laboratory / Federal Information Processing Standard / Critical Security Parameter / Cryptography / Cryptography standards / Security

FIPS PUBCHANGE NOTICESFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-12-20 11:10:57
9Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
10FIPS 140-2 / FIPS 140 / Cryptographic software / Data Encryption Standard / Zeroisation / Internet Key Exchange / Key Wrap / AES implementations / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 07:39:47
UPDATE