skip to main | skip to sidebar

atsec IT security blog

News about Common Criteria, cryptographic modules and other IT security topics

Crypto module related blogs

Cryptographic Modules and FIPS 140-2/3

  • Introduction to CMVP and CAVP
  • A FIPS 140-3 compliant hybrid KEM algorithm
  • PQC: Kyber and Dilithium - State of the (Draft) Standards
  • Artificial Intelligence in Evaluation, Validation, Testing and Certification 
  • Entropy Source Validation (ESV) Certificate Issued for the Intel DRNG
  • First Post-Quantum Algorithm Certificate issued by CAVP
  • CNSA 2.0 and Quantum Resistant Encryption Algorithms
  • The Cryptographic Module Validation Program (CMVP) issues the first FIPS 140-3 certificates
  • NIST Entropy Source Validation Server Available
  • FIPS 140-3 Submission Scenarios
  • Transitioning to NIST SP 800-56A Rev3: what you need to know
  • The Impact of TLS 1.3 and ACVTS on FIPS Certification Testing
  • Sample Size in NIST SP 800-90B
  • Commercial Assurance of Cryptography in North America
  • Collaboration and Openness to the rescue of entropy
  • The Top 3 Mistakes When Starting a FIPS 140-2 Project
  • Call for Papers: International Cryptographic Module Conference - 2013
  • FIPS 140-2 and the ISO standards
  • Cryptographic module related work in ISO/IEC JTC 1/SC 27/WG  

atsec summaries of the ICMC conferences: 

  • 1st ICMC 2013
  • 2nd ICMC 2014
  • 3rd ICMC 2015 
  • 4th ICMC 2016
  • 5th ICMC 2017
  • 6th ICMC 2018
  • 7th ICMC 2019
  • 8th ICMC 2020
  • 9th ICMC 2021
  • 10th ICMC 2022
  • 11th ICMC 2023

 

Home
Subscribe to: Posts (Atom)

Summary Page

  • Common Criteria blogs
  • Crypto module related blogs

Some of our favorite links

  • Contact us
  • atsec's official web site
  • ICCC
  • ICMC
  • Common Criteria Users' Forum
  • Cryptographic Module User Forum
  • ISSA

atsec Blog archives

Subscription

  • RSS Feed Subscription

Search this Blog

 

Please take a look at the following resources:

  • atsec website