Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Critical Security Parameter

Known as: CSP 
In cryptography, the abbreviation CSP may refer to Critical Security Parameter. A Critical Security Parameter is information that is either user or… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
This work is dedicated to the construction and evaluation of random number generators used in cryptography. The critical element… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • figure 5
Is this relevant?
2018
2018
Hardware Security Modules (HSMs) are embedded systems which provide a physically secured environment for data storage and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Many side channels including power consumption, electromagnetic emanation, optical radiation, and even sound have been studied… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2012
2012
Web configuration for SAS 9.3 Enterprise BI Web applications need to be secured according to an organization's security policy… Expand
Is this relevant?
2012
2012
External-cavity lasers are usually used for chaos encryption in optical chaos-based communication systems. The external-cavity… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
A critical issue in optical chaos-based communications is the possibility to identify the parameters of the chaotic emitter and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a method… Expand
Is this relevant?
2004
2004
The evaluation of information systems security is a process in which the evidence for assurance is identified, gathered, and… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?