<--- Back to Details
First PageDocument Content
Evaluation / Science / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Validation / Cryptography / Verification and validation / Cryptographic hash function / FIPS 140-3 / Cryptography standards / Computer security / FIPS 140-2
Date: 2013-05-28 08:16:10
Evaluation
Science
Cryptographic Module Validation Program
Cryptographic Module Testing Laboratory
Validation
Cryptography
Verification and validation
Cryptographic hash function
FIPS 140-3
Cryptography standards
Computer security
FIPS 140-2

<4D6963726F736F667420576F7264202D204A434D2D30312088C38D86838283578385815B838B8E8E8CB18B7982D194468FD890A7937882CC8AEE967B8B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Download Document from Source Website

File Size: 74,83 KB

Share Document on Facebook

Similar Documents

Logic / Mathematical logic / Mathematics / Boolean algebra / Complexity classes / Metalogic / Model theory / True quantified Boolean formula / Satisfiability / FO / PSPACE-complete / Well-formed formula

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

Design of experiments / Causal inference / Evaluation / Observational study / Methodology / Knowledge / Impact assessment / Confounding / Experiment / Quasi-experiment / Program evaluation / Impact evaluation

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

Education / Learning / Educational psychology / Course evaluation / Formative assessment / Educational assessment / Peer feedback / Educational technology / Active learning / Classroom Assessment Techniques

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document