<--- Back to Details
First PageDocument Content
Evaluation / Science / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Validation / Cryptography / Verification and validation / Cryptographic hash function / FIPS 140-3 / Cryptography standards / Computer security / FIPS 140-2
Date: 2013-05-28 08:16:10
Evaluation
Science
Cryptographic Module Validation Program
Cryptographic Module Testing Laboratory
Validation
Cryptography
Verification and validation
Cryptographic hash function
FIPS 140-3
Cryptography standards
Computer security
FIPS 140-2

<4D6963726F736F667420576F7264202D204A434D2D30312088C38D86838283578385815B838B8E8E8CB18B7982D194468FD890A7937882CC8AEE967B8B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Download Document from Source Website

File Size: 74,83 KB

Share Document on Facebook

Similar Documents

Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

DocID: 1qzKV - View Document

Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

DocID: 1q0mJ - View Document

Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

DocID: 1pWnz - View Document

Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

DocID: 1pTjt - View Document

Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

DocID: 1pFYl - View Document