Skip to search formSkip to main contentSkip to account menu

FIPS 140-2

Known as: FIPS 140-2 Level 4, FIPS 140-2 Level 2, FIPS 140-2 Level 1 
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Power supply currents of CMOS digital circuits partly flow through a silicon substrate in their returning (ground) paths. The… 
2013
2013
Fault injection based on intentional electromagnetic interference (IEMI) is attracting considerable attention in the field of… 
2013
2013
Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the… 
Highly Cited
2010
Highly Cited
2010
Recently, many utility companies have been adding synchrophasor measurement capability to their systems. Synchrophasors can… 
2007
2007
Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital… 
2006
2006
Strong identity management enforced with digital authentication mechanisms has become the leading requirement to improve cyber… 
2004
2004
  • 2004
  • Corpus ID: 17930626
An undesirable way, which a cryptographic An undesirable way, which a cryptographic module exchanges some information with its… 
2001
2001
  • 2001
  • Corpus ID: 60454702
Federal agencies, industry, and the public now rely on cryptography to protect information and communications used in critical…