Back to Results
First PageMeta Content
Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Common Criteria / Validation / Key size / Communications Security Establishment Canada / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / Computer security


Document Date: 2013-07-25 09:12:38


Open Document

File Size: 1,37 MB

Share Result on Facebook

Company

CST Laboratories / CST Labs / EMC / Microsoft / /

Country

United States / /

/

Facility

Cryptographic Module Validation Program National Institute of Standards and Technology / National Institute of Standards and Technology / CST laboratory / Cryptographic Module Validation Program National Institute of Standards and Technology Physical Test Report / Cryptographic Module Validation Program National Institute of Standards and Technology Carolyn French / FIPS PUB / Cryptographic Module Validation Program National Institute of Standards and Technology Informal Request / Cryptographic Module Validation Program National Institute of Standards and Technology General Issues G.1 Request / Government's National Institute of Standards and Technology / /

Holiday

Easter / /

Organization

National Institute of Standards and Technology / Institute of Standards and Technology Informal Request / Institute of Standards and Technology General Issues G.1 Request for Guidance / Institute of Standards and Technology Physical Test Report / /

Person

Beverly Trapnell / Sharon Keller / /

/

Position

Official / CRYPTIK General / Executive / SECURITY OFFICER / General / /

ProgrammingLanguage

JAVA / /

Technology

encryption / SHS ALGORITHMS / PUBLIC KEY / JAVA / 2 ACCEPTABLE KEY ESTABLISHMENT PROTOCOLS / IEEE 802.11I KEY DERIVATION PROTOCOLS / KEYED HASHING ALGORITHM / OPERATING SYSTEM / RSA SIGNATURE ALGORITHM / HIGHER CRYPTOGRAPHIC ALGORITHM USING SHS ALGORITHMS / DIGITAL SIGNATURE / pdf / EMBEDDED CRYPTOGRAPHIC ALGORITHMS / /

URL

http /

SocialTag