NIST logo

Publications Portal

You searched on:
Author: morris dworkin
Sorted by: title

Displaying records 1 to 10 of 15 records.
Resort by: Date / Title


1. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

2. Advanced Encryption Standard (AES)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 197
Published: 11/26/2001
Authors: Morris J Dworkin, Elaine B Barker, James R Nechvatal, James Foti, Lawrence E Bassham, E Roback, James F Dray Jr
Abstract: The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901427

3. Conference Report First Advanced Encryption Standard (AES) Candidate Conference, Ventura, CA, August 20-22, 1998
Published: 1/1/1999
Authors: E Roback, Morris J Dworkin
Abstract: On August 20-22, 1998, the National Institute of Standards and Technology (NIST) sponsored the First Advanced Encryption Standard (AES) Candidate Conference in Ventura, CA. At this conference fifteen candidate symmetricwhich have been accepted by N ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151184

4. Isolation and Characterization of Novel Marine-Derived Actinomycete Taxa Rich in Bioactive Metabolites
Published: 11/1/2004
Authors: Jennifer M Keller, Morris J Dworkin, N. A. Magarvey, V. Bernan, D. H. Sherman
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904489

5. Recommendation for Block Cipher Modes of Operation Methods and Techniques
Series: Special Publication (NIST SP)
Report Number: 800-38A
Published: 12/1/2001
Author: Morris J Dworkin
Abstract: This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CT ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51031

6. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
Series: Special Publication (NIST SP)
Report Number: 800-38B
Published: 5/1/2005
Author: Morris J Dworkin
Abstract: This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity, and, hence, the integrity, o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50211

7. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
Series: Special Publication (NIST SP)
Report Number: 800-38A Addendum
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

8. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
Series: Special Publication (NIST SP)
Report Number: 800-38D
Published: 11/28/2007
Author: Morris J Dworkin
Abstract: This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51288

9. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
Series: Special Publication (NIST SP)
Report Number: 800-38F
Published: 12/13/2012
Author: Morris J Dworkin
Abstract: This publication describes cryptographic methods that are approved for "key wrapping," i.e., the protection of the confidentiality and integrity of cryptographic keys. In addition to describing existing methods, this publication specifies two new ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912048

10. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007]
Series: Special Publication (NIST SP)
Report Number: 800-38C
Published: 5/1/2004
Author: Morris J Dworkin
Abstract: This Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150447



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series