![Computer security / FIPS 140-2 / Crime prevention / National security / FIPS 140 / Critical Security Parameter / Zeroisation / Cryptographic Module Validation Program / Information security / Cryptography / Cryptography standards / Security Computer security / FIPS 140-2 / Crime prevention / National security / FIPS 140 / Critical Security Parameter / Zeroisation / Cryptographic Module Validation Program / Information security / Cryptography / Cryptography standards / Security](https://www.pdfsearch.io/img/e9ca3423919e67166666ec31f14a1efd.jpg)
| Document Date: 2012-05-02 13:09:20 Open Document File Size: 1,12 MBShare Result on Facebook
Company AES / / Currency USD / / Facility COMPUTER SECURITY CRYPTOGRAPHY Information Technology Laboratory National Institute of Standards and Technology Gaithersburg / FIPS PUB / / IndustryTerm cryptographic software / cryptographic solutions / purpose computing platforms / security applications / potential applications / identified operator / software security / cryptographic module software / voice systems / cryptographic algorithms / security services / dedicated hardware systems / software components / telecommunications system / Software requirements / security systems / cryptographic algorithm / telecommunication systems / untrusted software / security parameter management / software development / purpose computing system / / Organization U.S. Department of Commerce / Institute of Standards and Technology Gaithersburg / Institute of Standards and Technology Director SUBCATEGORY / / Position Cryptographic Officer / General / officer / Secretary Technology Administration Under Secretary for Technology / / ProvinceOrState Maryland / / PublishedMedium Public Law / / Technology encryption / COMPUTER SECURITY CRYPTOGRAPHY Information Technology / radiation / cryptography / Information Technology / Operating System / digital signature / cryptographic algorithm / /
SocialTag |