2011 Third International Conference on Multimedia Information Networking and Security 2011
DOI: 10.1109/mines.2011.14
|View full text |Cite
|
Sign up to set email alerts
|

The Evaluation Model and Index System of Cryptographic Modules Security Assurance Ability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…In order to ensure that the confidential information in cryptographic ICs will be generated, stored, transmitted and processed safely, we define security for its information assurance capabilities with the ability to resist attacks. Cryptographic modules as one of the information security products, how to timely and efficiently evaluate its security to complete their functions, has issued the relevant international standards and many scholars have made a research in this are a (Su et al, 2011).…”
Section: Introductionmentioning
confidence: 99%
“…In order to ensure that the confidential information in cryptographic ICs will be generated, stored, transmitted and processed safely, we define security for its information assurance capabilities with the ability to resist attacks. Cryptographic modules as one of the information security products, how to timely and efficiently evaluate its security to complete their functions, has issued the relevant international standards and many scholars have made a research in this are a (Su et al, 2011).…”
Section: Introductionmentioning
confidence: 99%