Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: morris dworkin Sorted by: title

Displaying records 1 to 10 of 20 records.
Resort by: Date / Title


1. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

2. Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection
Series: ITL Bulletin
Published: 9/24/2015
Authors: Morris J Dworkin, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in FIPS 202. The publication specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the KECCAK algorithm that NIST s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919417

3. Advanced Encryption Standard (AES)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 197
Published: 11/26/2001
Authors: Morris J Dworkin, Elaine B Barker, James R. Nechvatal, James Foti, Lawrence E Bassham, E Roback, James F Dray Jr.
Abstract: The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901427

4. Analysis of VAES3 (FF2)
Published: 4/2/2015
Authors: Morris J Dworkin, Ray A Perlner
Abstract: The National Institute of Standards and Technology (NIST) specified three methods for format-preserving encryption (FPE) in Draft NIST Special Publication (SP) 800-38G, which was released for public comment in July, 2013. Each method was a mode of op ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917829

5. Conference Report First Advanced Encryption Standard (AES) Candidate Conference, Ventura, CA, August 20-22, 1998
Published: 1/1/1999
Authors: E Roback, Morris J Dworkin
Abstract: On August 20-22, 1998, the National Institute of Standards and Technology (NIST) sponsored the First Advanced Encryption Standard (AES) Candidate Conference in Ventura, CA. At this conference fifteen candidate symmetricwhich have been accepted by N ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151184

6. Isolation and Characterization of Novel Marine-Derived Actinomycete Taxa Rich in Bioactive Metabolites
Published: 11/1/2004
Authors: Jennifer M Lynch, Morris J Dworkin, N. A. Magarvey, V. Bernan, D. H. Sherman
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904489

7. New NIST Security Standard Can Protect Credit Cards, Health Information
Series: ITL Bulletin
Report Number: April 2016
Published: 4/14/2016
Authors: Morris J Dworkin, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-38G, "Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption." The publication specifies two methods for format-preserving ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920780

8. Recommendation for Block Cipher Modes of Operation Methods and Techniques
Series: Special Publication (NIST SP)
Report Number: 800-38A
Published: 12/1/2001
Author: Morris J Dworkin
Abstract: This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CT ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51031

9. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
Series: Special Publication (NIST SP)
Report Number: 800-38B
Published: 5/1/2005
Author: Morris J Dworkin
Abstract: This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity, and, hence, the integrity, o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50211

10. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
Series: Special Publication (NIST SP)
Report Number: 800-38A Addendum
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series