Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

FIPS 140-2

Known as: FIPS 140-2 Level 4, FIPS 140-2 Level 2, FIPS 140-2 Level 1 
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper investigates the state of the current high-level synthesis (HLS) tools by using Xilinx Vivado HLS for designing a… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
With recent developments in information and communication technologies, the need of security products having cryptographic… Expand
Is this relevant?
2013
2013
This paper presents an efficient map generation technique for evaluating the intensity of electromagnetic (EM) radiation… Expand
  • figure 3
  • figure 1
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
2011
2011
  • Tom Caddy
  • Encyclopedia of Cryptography and Security
  • 2011
  • Corpus ID: 8290310
A non-spillable drinking container is comprised of a resiliently flexible material with a drinking tube or straw sealably mounted… Expand
Is this relevant?
2011
2011
Cryptographic circuits can be subjected to several kinds of side-channel and fault attacks in order to extract the secret key… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Recently, many utility companies have been adding synchrophasor measurement capability to their systems. Synchrophasors can… Expand
  • figure 1
  • table I
  • figure 4
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard… Expand
Is this relevant?
2001
2001
Federal agencies, industry, and the public now rely on cryptography to protect information and communications used in critical… Expand
  • figure 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Abstract : The selective application of technological and related procedural safeguards is an important responsibility of every… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
1991
1991
of the principal reasons that robust delay-fault testing has not been used extensively in industry is that the application of a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?