Information technology — Security techniques — Testing cryptographic modules in their operational environmentTechnol...