Back to Results
First PageMeta Content
Cryptographic software / FIPS 140-2 / Critical Security Parameter / Key Wrap / FIPS 140 / Key size / BitLocker Drive Encryption / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard


Microsoft Word - 1e - EFJohnson Technologies - Security Policy v5_28.doc
Add to Reading List

Document Date: 2014-09-10 14:59:55


Open Document

File Size: 322,38 KB

Share Result on Facebook

Company

AES / Proprietary Security Policy Hardware / CBC / User and CO / Texas Instruments / Role ID Role Description CO / EFJohnson Technologies radio / Motorola / EMC / EFJohnson Technologies / Cryptographic / 20 EFJohnson Technologies / /

Currency

pence / /

Event

FDA Phase / /

Facility

Key Management Facility / /

Holiday

Assumption / /

IndustryTerm

radio embedded processor / mobile radio products / software functional blocks / radio subscriber equipment / subscriber equipment / cipher algorithms / external communications / voice and data / input/output devices / radio device / security algorithms / /

Organization

Telecommunications Industry Association / European Central Bank / /

/

Position

ST M25P40 TI DSP C5509A SPI ARM Protocol Communication Encryption Controller / Encryption Controller / EFJ Subscriber Management Assistant / /

Product

Cryptographic Officer / P25 / C5509A / /

ProgrammingLanguage

DC / /

Technology

Encryption / RAM / flash memory / Public Key / 3.5 Encryption / 9 Subscriber Encryption / DSP Protocol / Subscriber Encryption / radio embedded processor / 1 Subscriber Encryption / 5.28 Algorithm / security algorithms / Random Access / Digital Signature / cipher algorithms / Usage Key Storage Key encryption / 1.2 Subscriber Encryption / DSP / DSP chip / Flash / Cryptographic Functions Algorithm / 1.1 Subscriber Encryption / /

SocialTag