Back to Results
First PageMeta Content
FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / IPsec / Hardware random number generator / SHA-2 / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2


FIPS[removed]Non-Proprietary Security Policy
Add to Reading List

Document Date: 2014-10-24 09:18:16


Open Document

File Size: 1,08 MB

Share Result on Facebook

City

Austin / /

Company

AES / Page / Inside Secure B.V. / RTL / EMC / /

/

Event

FDA Phase / /

Facility

FIPS PUB / /

/

IndustryTerm

mobile communications / cryptographic algorithms / wireless handsets / digital media content / intensive symmetric algorithms / computational intensive hash algorithms / consumer electronics appliances / end-user products / technology dependent / content processing / /

Organization

ASIC / /

/

Position

DMA controller / /

Product

VaultIP / Zynq-7000 / /

ProgrammingLanguage

Verilog / /

ProvinceOrState

Texas / /

Technology

Encryption / FPGA / FPGA chip / ASIC / Verilog / public key / computational intensive hash algorithms / mobile phones / computationally intensive symmetric algorithms / PDA / Integrated Circuits / cryptographic algorithms / flash / Public Key Encryption / /

URL

http /

SocialTag