<--- Back to Details
First PageDocument Content
FIPS 140 / Critical Security Parameter / Cyberwarfare / Computing / Cryptography standards / Computer security / Zeroisation
Date: 2014-06-25 13:52:18
FIPS 140
Critical Security Parameter
Cyberwarfare
Computing
Cryptography standards
Computer security
Zeroisation

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1,96 MB

Share Document on Facebook

Similar Documents

Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

DocID: 1qJrK - View Document

Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

DocID: 1qFms - View Document

Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

DocID: 1pWnz - View Document

Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

DocID: 1pmIM - View Document

Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

DocID: 1oGh8 - View Document