NIST logo

Publications Portal

You searched on:
Author: lawrence bassham
Sorted by: title

Displaying records 1 to 10 of 13 records.
Resort by: Date / Title


1. A Guide to the Selection of Anti-Virus Tools and Techniques
Series: Special Publication (NIST SP)
Report Number: 800-5
Published: 12/1/1992
Authors: William T Polk, Lawrence E Bassham
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890075

2. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Series: Special Publication (NIST SP)
Report Number: 800-22 Rev 1a
Published: 9/16/2010
Authors: Lawrence E Bassham, Andrew L Rukhin, Juan Soto, James R Nechvatal, Miles E. Smid, Stefan D Leigh, M Levenson, M Vangel, Nathanael A Heckert, D L. Banks
Abstract: This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906762

3. Advanced Encryption Standard (AES)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 197
Published: 11/26/2001
Authors: Morris J Dworkin, Elaine B Barker, James R Nechvatal, James Foti, Lawrence E Bassham, E Roback, James F Dray Jr
Abstract: The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901427

4. Bibliography of Selected Computer Security Publications, January 1980 - October 1989
Series: Special Publication (NIST SP)
Report Number: 800-1
Published: 12/1/1990
Authors: Rein Turn, Lawrence E Bassham
Abstract: This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journal ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=100001

5. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard
Published: 4/1/2000
Author: Lawrence E Bassham
Abstract: This paper describes the testing methodology used in ANSI C efficiency testing of the Round 2 Candidates for the Advanced Encryption Standard, along with a few observations regarding those measurements. This paper also has tables of timing and cycle ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151210

6. Efficiency Testing of ANSI C Implementations of Round1 Candidate Algorithms for the Advanced Encryption Standard
Report Number: 6391
Published: 10/1/1999
Author: Lawrence E Bassham
Abstract: The evaluation criteria for the Advanced Encryption Standard (AES) Round1 candidate algorithms, as specified in the Request for Comments (1), includes computional efficiency, among other criteria. Specifically, the Call For AES Candidate Algorithms ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151194

7. Randomness Testing of the Advanced Encryption Standard Finalist Candidates
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6483
Published: 4/1/2000
Authors: Juan Soto, Lawrence E Bassham
Abstract: Mars, RC6, Rijndael, Serpent and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' suitability as random number generators, empirical statistical testing is commonly employed. Although it widely ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151216

8. Report on the Development of the Advanced Encryption Standard (AES)
Series: Journal of Research (NIST JRES)
Published: 6/1/2001
Authors: James R Nechvatal, Elaine B Barker, Lawrence E Bassham, William E. (William E.) Burr, Morris J Dworkin, James Foti, E Roback
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibiliti ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151226

9. Security Issues in the Database Language SQL
Series: Special Publication (NIST SP)
Report Number: 800-8
Published: 8/2/1993
Authors: William T Polk, Lawrence E Bassham
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890091

10. Security of SQL-Based Implementations of Product: Data Exchange Using Step
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5283
Published: 10/1/1993
Authors: Lawrence E Bassham, William T Polk
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900694



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series