Back to Results
First PageMeta Content
Computer security / FIPS 140-2 / Crime prevention / National security / FIPS 140 / Critical Security Parameter / Zeroisation / Cryptographic Module Validation Program / Information security / Cryptography / Cryptography standards / Security


FIPS[removed]Draft) Security Requirements for Cryptgoraphic Modules
Add to Reading List

Document Date: 2012-05-02 13:09:20


Open Document

File Size: 1,12 MB

Share Result on Facebook

Company

AES / /

Currency

USD / /

Facility

COMPUTER SECURITY CRYPTOGRAPHY Information Technology Laboratory National Institute of Standards and Technology Gaithersburg / FIPS PUB / /

IndustryTerm

cryptographic software / cryptographic solutions / purpose computing platforms / security applications / potential applications / identified operator / software security / cryptographic module software / voice systems / cryptographic algorithms / security services / dedicated hardware systems / software components / telecommunications system / Software requirements / security systems / cryptographic algorithm / telecommunication systems / untrusted software / security parameter management / software development / purpose computing system / /

Organization

U.S. Department of Commerce / Institute of Standards and Technology Gaithersburg / Institute of Standards and Technology Director SUBCATEGORY / /

Position

Cryptographic Officer / General / officer / Secretary Technology Administration Under Secretary for Technology / /

ProvinceOrState

Maryland / /

PublishedMedium

Public Law / /

Technology

encryption / COMPUTER SECURITY CRYPTOGRAPHY Information Technology / radiation / cryptography / Information Technology / Operating System / digital signature / cryptographic algorithm / /

SocialTag