NIST logo

Publications Portal

You searched on:
Author: elaine barker
Sorted by: title

Displaying records 1 to 10 of 38 records.
Resort by: Date / Title


1. A Framework for Designing Cryptographic Key Management Systems
Series: Special Publication (NIST SP)
Report Number: 800-130
Published: 8/15/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Abstract: This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914228

2. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268

3. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Series: Special Publication (NIST SP)
Report Number: 800-22
Published: 5/15/2001
Authors: Andrew L Rukhin, Juan Soto, James R Nechvatal, Miles E. Smid, Elaine B Barker, Stefan D Leigh, M Levenson, M Vangel, D L. Banks, Nathanael A Heckert, James F Dray Jr, S C. Vo
Abstract: [Superseded by SP 800-22 Revision 1a (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906762] This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151222

4. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Series: ITL Bulletin
Published: 12/20/2000
Author: Elaine B Barker
Abstract: Random and pseudorandom numbers are needed for many cryptographic applications. For example, common cryptosystems employ keys that must be generated in a random fashion. Many cryptographic protocols also require random or pseudorandom inputs at var ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151231

5. Advanced Encryption Standard (AES)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 197
Published: 11/26/2001
Authors: Morris J Dworkin, Elaine B Barker, James R Nechvatal, James Foti, Lawrence E Bassham, E Roback, James F Dray Jr
Abstract: The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901427

6. Cryptographic Key Management Workshop Summary - June 8-9, 2009
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7609
Published: 1/8/2010
Authors: Elaine B Barker, Dennis Keith Branstad, Santosh Chokhani, Miles E. Smid
Abstract: On June 8 and 9, 2009, NIST held a Cryptographic Key Management (CKM) Workshop at its Gaithersburg, Maryland, campus that attracted approximately 80 people attending the workshop in person, with another 75 participating through video conferencing, an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904169

7. Cryptographic Protection for the Twenty-First Century
Published: 3/1/2001
Author: Elaine B Barker
Abstract: In 2000, the National Institute of Standards and Technology (NIST) announced the selection of a new encryption algorithm that will be used to protect sensitive (unclassified) government information. This algorithm, to be proposed as the Advanced Encr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151233

8. Cryptographic Standards and Guidance: A Status Report
Series: ITL Bulletin
Published: 9/1/2002
Author: Elaine B Barker
Abstract: A comprehensive toolkit of cryptographic standards and associated guideline that covers a wide range of cryptographic technology is currently under development by the Computer Security Division at NIST. These standards and guidelines will enable U.S ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51021

9. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-3
Published: 6/25/2009
Author: Elaine B Barker
Abstract: [Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthori ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984

10. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-4
Published: 7/19/2013
Author: Elaine B Barker
Abstract: This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series