NIST logo

Publications Portal

You searched on:
Author: elaine barker

Displaying records 11 to 20 of 32 records.
Resort by: Date / Title


11. NIST SP 800-131A: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Series: Special Publication (NIST SP)
Report Number: 800-131
Published: 1/13/2011
Authors: Elaine B Barker, Allen L Roginsky
Abstract: At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907517

12. Recommendation for Password-Based Key Derivation Part I: Storage Applications
Series: Special Publication (NIST SP)
Report Number: 800-132
Published: 12/22/2010
Authors: Meltem Sonmez Turan, Elaine B Barker, William Edward Burr, Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection keys.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907381

13. Cryptographic Key Management Workshop Summary - June 8-9, 2009
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7609
Published: 1/8/2010
Authors: Elaine B Barker, Dennis Keith Branstad, Santosh Chokhani, Miles E. Smid
Abstract: On June 8 and 9, 2009, NIST held a Cryptographic Key Management (CKM) Workshop at its Gaithersburg, Maryland, campus that attracted approximately 80 people attending the workshop in person, with another 75 participating through video conferencing, an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904169

14. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

15. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

16. NIST SP 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establishment Using Integer Factorization Cryptography, which was developed by the Accredited Standards Committee (ASC) X9, Inc. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903082

17. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-3
Published: 6/25/2009
Author: Elaine B Barker
Abstract: The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984

18. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180-3
Published: 10/31/2008
Authors: Elaine B Barker, Quynh H Dang
Abstract: This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901372

19. NIST SP 800-56A: Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-56
Published: 3/14/2007
Authors: Elaine B Barker, Don Johnson, Miles E. Smid
Abstract: This Recommendation provides the specifications of key establishment schemes that are appropriate for use by the U.S. Federal Government, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: American National Standard (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150618

20. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-90
Published: 3/14/2007
Authors: Elaine B Barker, John M Kelsey
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either cryptographic hash functions, block cipher algorithms or number theoretic problems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50814



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series