<--- Back to Details
First PageDocument Content
Computer security / FIPS 140-2 / Crime prevention / National security / FIPS 140 / Critical Security Parameter / Zeroisation / Cryptographic Module Validation Program / Information security / Cryptography / Cryptography standards / Security
Date: 2012-05-02 13:09:20
Computer security
FIPS 140-2
Crime prevention
National security
FIPS 140
Critical Security Parameter
Zeroisation
Cryptographic Module Validation Program
Information security
Cryptography
Cryptography standards
Security

FIPS[removed]Draft) Security Requirements for Cryptgoraphic Modules

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1,12 MB

Share Document on Facebook

Similar Documents

Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

DocID: 1qzKV - View Document

Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

DocID: 1q0mJ - View Document

Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

DocID: 1pWnz - View Document

Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

DocID: 1pTjt - View Document

Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

DocID: 1pFYl - View Document