<--- Back to Details
First PageDocument Content
Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations
Date: 2016-08-02 22:30:34
Cryptography standards
FIPS 140-2
FIPS 140
Bouncy Castle
Cryptographic Module Validation Program
SHA-2
Advanced Encryption Standard
Critical Security Parameter
Zeroisation
Cryptography
PKCS
AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Download Document from Source Website

File Size: 587,34 KB

Share Document on Facebook

Similar Documents

Standards for Efficient Cryptography  SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

DocID: 1ujwj - View Document

Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

DocID: 1sMuZ - View Document

COMMONWEALTH OF VIRGINIA  Department of Small Business and Supplier Diversity Virginia Employment Service Organization Certification Application Organization Name: Address:

COMMONWEALTH OF VIRGINIA Department of Small Business and Supplier Diversity Virginia Employment Service Organization Certification Application Organization Name: Address:

DocID: 1rugH - View Document

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

DocID: 1rrG7 - View Document

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA  December 2015

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

DocID: 1rqKX - View Document