Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,371,606 papers from all fields of science
Search
Sign In
Create Free Account
FIPS 140-2
Known as:
FIPS 140-2 Level 4
, FIPS 140-2 Level 2
, FIPS 140-2 Level 1
Expand
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
BlackBerry
Common Criteria
Comparison of SSH clients
Comparison of TLS implementations
Expand
Broader (1)
Cryptography standards
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Side-channel leakage on silicon substrate of CMOS cryptographic chip
Daisuke Fujimoto
,
Daichi Tanaka
,
+5 authors
J. Danger
IEEE International Symposium on Hardware Oriented…
2014
Corpus ID: 17871317
Power supply currents of CMOS digital circuits partly flow through a silicon substrate in their returning (ground) paths. The…
Expand
2013
2013
Map-based analysis of IEMI fault injection into cryptographic devices
Y. Hayashi
,
N. Homma
,
T. Mizuki
,
T. Aoki
,
H. Sone
IEEE International Symposium on Electromagnetic…
2013
Corpus ID: 24047379
Fault injection based on intentional electromagnetic interference (IEMI) is attracting considerable attention in the field of…
Expand
2013
2013
General scheme of differential power analysis
Zdenek Martinasek
,
Vlastimil Clupek
,
K. Trasy
International Conference on Telecommunications…
2013
Corpus ID: 15513266
Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the…
Expand
2012
2012
An improved chaotic cryptosystem based on circular bit shift and XOR operations
Shujiang Xu
,
Xiu-Bo Chen
,
Ru Zhang
,
Yixian Yang
,
Yucui Guo
2012
Corpus ID: 54602697
Highly Cited
2010
Highly Cited
2010
A Flexible Phasor Data Concentrator Design Leveraging Existing Software Technologies
Andrew Armenia
,
J. Chow
IEEE Transactions on Smart Grid
2010
Corpus ID: 29846971
Recently, many utility companies have been adding synchrophasor measurement capability to their systems. Synchrophasors can…
Expand
2007
2007
Watermarks and Text Transformations in Visual Document Authentication
Igor Fischer
,
T. Herfet
Journal of Computers
2007
Corpus ID: 18106443
Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital…
Expand
2006
2006
Cyber Security Management for Utility Operations
D. Holstein
,
Jose Diaz
Proceedings of the 39th Annual Hawaii…
2006
Corpus ID: 11486351
Strong identity management enforced with digital authentication mechanisms has become the leading requirement to improve cyber…
Expand
2004
2004
PIO Based on a Power Side Channel
2004
Corpus ID: 17930626
An undesirable way, which a cryptographic An undesirable way, which a cryptographic module exchanges some information with its…
Expand
2004
2004
A random number generator based on elliptic curve operations
Lap-piu Lee
,
Kwok-wo Wong
2004
Corpus ID: 102334971
2001
2001
SP 800-29. A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
2001
Corpus ID: 60454702
Federal agencies, industry, and the public now rely on cryptography to protect information and communications used in critical…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE