FIPS 140-2

Known as: FIPS 140-2 Level 4, FIPS 140-2 Level 2, FIPS 140-2 Level 1 
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2004-2017
024620042017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Pseudo random numbers are used for various purposes. Pseudo random number generators (PRNGs) are useful tools to provide pseudo… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
2013
2013
This paper explains how an attacker can efficiently factor 184 distinct RSA keys out of more than two million 1024-bit RSA keys… (More)
Is this relevant?
2013
2013
In this paper, a novel 3-dimensional discrete chaotic map is introduced. The calculated Lyapunov exponents of the map are 0.0705… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2009
2009
The paper presents several modifications of the True Random Number Generator proposed by Kohlbrenner and Gaj in 2004. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
A novel multiple-output pseudo-random-bit generator (PRBG) based on a coupled map lattice (CML) consisting of skew tent maps… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
According to the postulation of Shannon's theoretical unbreakable cryptography, in practice, a pseudo-random bit sequence (PRBS… (More)
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Is this relevant?
2006
2006
In this paper, the guidelines to design a true random bit generator (TRBG) circuit with a predefined minimum entropy are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Since stream ciphers have the reputation to be inefficient in software applications the new stream cipher Hermes8F has been… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a method… (More)
Is this relevant?
2004
2004
Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
Is this relevant?