Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: elaine barker

Displaying records 11 to 20 of 50 records.
Resort by: Date / Title

11. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev 2
Published: 6/5/2013
Authors: Elaine B Barker, Lidong Chen, Allen L Roginsky, Miles Smid
Abstract: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supers ...

12. Summary of the Workshop on Cryptographic Key Management Systems (CKMS)
Published: 1/10/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad
Abstract: A workshop was held on September 10-11, 2012 to discuss two documents that have been posted for public comment: SP 800-130 (A Framework for Designing Cryptographic Key Management Systems) and a table of proposed requirements for SP 800-152 (A Profile ...

13. Recommendation for Cryptographic Key Generation
Series: Special Publication (NIST SP)
Report Number: 800-133
Published: 12/21/2012
Authors: Elaine B Barker, Allen L Roginsky
Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cry ...

14. Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance
Series: ITL Bulletin
Published: 7/10/2012
Authors: Paul Turner, William T Polk, Elaine B Barker
Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certific ...

15. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 3
Published: 7/10/2012
Authors: Elaine B Barker, William Curtis Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: [Superseded by SP 800-57 Part 1 Revision 4 (January 2016): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919831]This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines ...

16. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A
Published: 1/23/2012
Author: Elaine B Barker
Abstract: [Superseded by SP 800-90A Revision 1 (June 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918489] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are ba ...

17. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
Series: Special Publication (NIST SP)
Report Number: 800-67 Rev 1
Published: 1/23/2012
Authors: William Curtis Barker, Elaine B Barker
Abstract: This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2 ...

18. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Series: Special Publication (NIST SP)
Report Number: 800-131A
Published: 1/13/2011
Authors: Elaine B Barker, Allen L Roginsky
Abstract: [Superseded by SP 800-131A Revision 1 (November 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919563] At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing crypto ...

19. Recommendation for Password-Based Key Derivation Part 1: Storage Applications
Series: Special Publication (NIST SP)
Report Number: 800-132
Published: 12/22/2010
Authors: Meltem Sonmez Turan, Elaine B Barker, William Edward Burr, Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection keys.

20. Cryptographic Key Management Workshop Summary - June 8-9, 2009
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7609
Published: 1/8/2010
Authors: Elaine B Barker, Dennis Keith Branstad, Santosh Chokhani, Miles E. Smid
Abstract: On June 8 and 9, 2009, NIST held a Cryptographic Key Management (CKM) Workshop at its Gaithersburg, Maryland, campus that attracted approximately 80 people attending the workshop in person, with another 75 participating through video conferencing, an ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series