自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (18)
  • 收藏
  • 关注

空空如也

Cypress S27KL0641 HyperRAM中文用户手册

特殊特性 HyperRAM 低电平信号计数接口 3.0 V I/O, 11 个总线信号 – 单端时钟(CK) 1.8 V I/O, 12 个总线信号 – 差分时钟(CK、CK#) 芯片选择(CS#) 8 位数据总线(DQ[7:0]) 读写数据选通(RWDS) – 双向数据选通/ 掩码 – 在开始执行任何操作时作为输出,用于指示刷新延迟 – 在读取过程中作为输出,其功能是读取数据选通 – 在写入过程中作为输入,其功能是写入数据掩码 RWDS DCARS 时序 – 在读取过程中,与CK 相移的第二时钟是RWDS 的偏移 – 相移的时钟用于将RWDS 切换沿移动到读数据眼图范围内 高性能 高达333 MB/s 双数据速率(DDR):每个时钟周期内进行两个数据传输 VCC = 1.8 V 时,时钟频率可达166 MHz(相应速率为 333 MB/s) VCC = 3.0 V 时,时钟频率可达100 MHz(相应速率为 200 MB/s) 顺序突发操作 可配置突发特性 – 循环突发长度: – 16 个字节(8 个时钟周期) – 32 个字节

2023-02-08

NIST.FIPS.200.pdf

NIST.FIPS.200.pdf

2021-09-29

FIPS-140-2-CMVP Management Manual 09-09-2021.pdf

FIPS-140-2-CMVP Management Manual 09-09-2021.pdf

2021-09-29

Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf

Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf

2021-09-29

NIST.FIPS.186-5-draft.pdf

(P256/P384/P521/W25519/W448/Curve25519/Edwards448)

2021-08-31

SHA_All.pdf

NIST 官方Secure Hash function 测试数据, 包括SHA1和SHA2所有变种

2021-08-10

AES_Core_All.pdf

AES 官方测试数据, 包含ECB/CBC/CTR/CFB/OFB, key 128/192/256的所有数据及其计算中间数,方便测试设计

2021-08-10

FIPS1402IG.pdf Implementation Guidance for FIPS 140-2

FIPS1402IG.pdf Implementation Guidance for FIPS 140-2

2021-06-04

NIST.FIPS.186-4.pdf Digital Signature Standard (DSS)

This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time.

2021-06-04

NIST.SP.800-185.pdf SHA-3 Derived Functions:cSHAKE, KMAC

This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in Federal Information Processing Standard (FIPS) 202. KMAC (for KECCAK Message Authentication Code) is a variable-length message authentication code algorithm based on KECCAK; it can also be used as a pseudorandom function. TupleHash is a variable-length hash function designed to hash tuples of input strings without trivial collisions. ParallelHash is a variable-length hash function that can hash very long messages in parallel.

2021-06-04

session8-abdulgadir-open-source-platform-for-evaluating.pdf

session8-abdulgadir-open-source-platform-for-evaluating.pdf

2021-06-04

NIST.SP.800-56Cr2.pdf

This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.

2021-06-04

NIST.SP.800-57pt1r5.pdf NIST Recommendation for Key Management:

This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the algorithms and key types that may be employed, specifications of the protection that each type of key and other cryptographic information requires and methods for providing this protection, discussions about the functions involved in key management, and discussions about a variety of key-management issues to be addressed when using cryptography. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Part 3 provides guidance when using the cryptographic features of current systems.

2021-06-04

NIST.SP.800-133r2.pdf NIST关于密码系统中密钥生成的的建议

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.

2021-06-04

NIST.SP.800-175Br1.pdf NIST 密码系统使用指南

Guideline for Using Cryptographic Standards in the Federa asymmetric-key algorithm; identity authentication; confidentiality; digital signatures; encryption; integrity; key establishment; message authentication; random bit generation; symmetric-key algorithm

2021-06-04

NIST.SP.800-126r3.pdf NIST SCAP 1.3version

The Technical Specification for the Security Content Automation Protocol (SCAP)

2021-06-04

sp800_90c_second_draft.pdf 随机数生成器标准 NIST

美国国家标准与技术研究院 关于随机数生成器结构的标准与建议

2021-06-04

NIST.SP.800-90B.pdf NIST 随机数生成标准及建议

美国国家标准与技术研究院关于随机数生成及测试的标准

2021-06-04

ISO 26262-2011 first edition.zip

ISO国际标准 26262 2011版 国际标准ISO/SAE 21434(道路车辆-网络安全工程)规定车辆在整个生命周期(包括概念、开发、生产、操作、维护和报废)网络安全风险的管理要求,使汽车生命周期的各个阶段提升安全保障。该标准为网络安全的工程开发和管理流程提供了一个框架,使车辆制造商和供应商能够使用通用的语言交流网络安全要求,同时不对技术解决方案施加限制。

2021-06-04

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除