NIST logo

Publications Portal

You searched on:
Author: elaine barker

Displaying records 1 to 10 of 38 records.
Resort by: Date / Title


1. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

2. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268

3. A Framework for Designing Cryptographic Key Management Systems
Series: Special Publication (NIST SP)
Report Number: 800-130
Published: 8/15/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Abstract: This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914228

4. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-4
Published: 7/19/2013
Author: Elaine B Barker
Abstract: This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162

5. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev 2
Published: 6/5/2013
Authors: Elaine B Barker, Lidong Chen, Allen L Roginsky, Miles Smid
Abstract: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supers ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913431

6. Summary of the Workshop on Cryptographic Key Management Systems (CKMS)
Published: 1/10/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad
Abstract: A workshop was held on September 10-11, 2012 to discuss two documents that have been posted for public comment: SP 800-130 (A Framework for Designing Cryptographic Key Management Systems) and a table of proposed requirements for SP 800-152 (A Profile ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912497

7. Recommendation for Cryptographic Key Generation
Series: Special Publication (NIST SP)
Report Number: 800-133
Published: 12/21/2012
Authors: Elaine B Barker, Allen L Roginsky
Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cry ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912496

8. Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance
Series: ITL Bulletin
Published: 7/10/2012
Authors: Paul Turner, William T Polk, Elaine B Barker
Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certific ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911197

9. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 3
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342

10. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A
Published: 1/23/2012
Author: Elaine B Barker
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910345



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series