Back to Results
First PageMeta Content
Computer security / Cryptography standards / Microsoft CryptoAPI / FIPS 140-2 / Cryptographic Service Provider / FIPS 140 / SHA-1 / CryptGenRandom / Crypto++ / Cryptography / Cryptographic software / Computing


Microsoft Word - 01o - TC-SecPol-27.doc
Add to Reading List

Document Date: 2007-09-19 01:00:00


Open Document

File Size: 69,19 KB

Share Result on Facebook

Company

AES / Interfaces / Phoenix Technologies Ltd. / EMC / Intel / Microsoft / StrongClient (without StrongROM) Phoenix Technologies Ltd. / Certificate Number 164 Phoenix Technologies Ltd. / Boundary Phoenix Technologies Ltd. / /

Event

FDA Phase / /

IndustryTerm

deterministic algorithm / mode operators / compliant software module / enterprise network applications / legacy e-mail systems / network infrastructure products / legacy systems / /

OperatingSystem

Microsoft Windows / XP / /

Position

General / /

Product

TrustConnector 2 / RC2 / MD5 / /

Technology

non-FIPS approved algorithms / RAM / Application Program Interface / Nondeterministic RNG algorithms / DRNG algorithms / Operating System / MD5 algorithms / API / PKI / RSA encryption / approved deterministic algorithm / /

URL

http /

SocialTag