1[1]Office of Management and Budget.FY 2005:Report to Congress on Implementation of The Federal Information Security Management Act of 2002.http//www.csrc.nist.gov/cryptval/.March 1,2006.
2[2]National Institute of Standards and Technology.FIPS140-2:SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES.http://www.csrc.nist.gov/cryptval/.May 25,2001.
3[3]National Institute of Standards and Technology.ITL BULLETIN:A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS 140-1 AND FIPS 140-2.http://www.csrc.nist.gov/cryptval/.July,2001.
4[4]Office of Management and Budget.Appendix Ⅲ to OMB Circular No.A-130.Security of Federal Automated Information Resources.http,//www.csrc.nist.gov/cryptval/.1996.
5[5]National Institute of Standards and Technology.SP800-57:Recommendation for Key Management-Part 2:Best Practices for Key Management Organization.http://www.csrc.nist.gov/cryptval/.August,2005.
6[6]National Institute of Standards and Technology.SP800-21:Guideline for Implementing Cryptography In the Federal Government.http://www.csrc.nist.gov/cryptval/.December.2005.