Snouffer, R.
, Lee, A.
and Oldehoeft, A.
(2001),
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-29
(Accessed December 10, 2024)