Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
FIPS 140
Known as:
FIPS 140-1
, FIPS-140
The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Common Criteria
Computer security
FIPS 140-2
FIPS 140-3
Expand
Broader (1)
Cryptography standards
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Estándares criptográficos aplicados a la infraestructura de clave pública de américa del sur
Aida Diana Ormaza Vintimilla
,
José Antonio Carrillo Zenteno
,
F. J. Burgos
2017
Corpus ID: 169780278
espanolUna de las principales aplicaciones de la criptografia es la proteccion de la informacion, asegurando la autenticacion…
Expand
Highly Cited
2017
Highly Cited
2017
Amplitude Control Analysis of a Four-Wing Chaotic Attractor, its Electronic Circuit Designs and Microcontroller-Based Random Number Generator
Akif Akgul
,
Chunbiao Li
,
I. Pehlivan
J. Circuits Syst. Comput.
2017
Corpus ID: 1985590
An exhaustive analysis of a four-wing chaotic system is presented in this paper. It is proved that the evolution range of some…
Expand
2013
2013
A novel iris and chaos-based random number generator
Hegui Zhu
,
Cheng Zhao
,
Xiangde Zhang
,
Lianping Yang
Computers & security
2013
Corpus ID: 40614298
2012
2012
An improved chaotic cryptosystem based on circular bit shift and XOR operations
Shujiang Xu
,
Xiu-Bo Chen
,
Ru Zhang
,
Yixian Yang
,
Yucui Guo
2012
Corpus ID: 54602697
2010
2010
Caveat venditor
George French
,
M. Bond
Information Security Technical Report
2010
Corpus ID: 19497597
2005
2005
Software Hardening & FIPS 140
E. Bacic
,
Gary L. Maxwell
2005
Corpus ID: 50986045
: FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a…
Expand
Highly Cited
2004
Highly Cited
2004
Biometric random number generators
J. Szczepański
,
E. Wajnryb
,
J. Amigó
,
Maria V. Sanchez-Vives
,
M. Slater
Computers & security
2004
Corpus ID: 18986063
2001
2001
SP 800-29. A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
2001
Corpus ID: 60454702
Federal agencies, industry, and the public now rely on cryptography to protect information and communications used in critical…
Expand
Review
2000
Review
2000
Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences
Steve H. Weingart
Workshop on Cryptographic Hardware and Embedded…
2000
Corpus ID: 26554264
As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing…
Expand
2000
2000
ON CONSTRUCTIVE APPROACH TO CHAOTIC PSEUDORANDOM NUMBER GENERATORS
Z. Kotulski
,
K. Górski
,
A. Górska
,
A. Paszkiewicz
2000
Corpus ID: 59021377
Among pseudorandom number generators widely used in engineering applications, Chaotic Pseudorandom Number Generators (CPRNG) have…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE