Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: elaine barker

Displaying records 11 to 20 of 52 records.
Resort by: Date / Title

11. A Framework for Designing Cryptographic Key Management Systems
Series: Special Publication (NIST SP)
Report Number: 800-130
Published: 8/15/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Abstract: This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that n ...

12. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-4
Published: 7/19/2013
Author: Elaine B Barker
Abstract: This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient o ...

13. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev 2
Published: 6/5/2013
Authors: Elaine B Barker, Lidong Chen, Allen L Roginsky, Miles Smid
Abstract: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supers ...

14. Summary of the Workshop on Cryptographic Key Management Systems (CKMS)
Published: 1/10/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad
Abstract: A workshop was held on September 10-11, 2012 to discuss two documents that have been posted for public comment: SP 800-130 (A Framework for Designing Cryptographic Key Management Systems) and a table of proposed requirements for SP 800-152 (A Profile ...

15. Recommendation for Cryptographic Key Generation
Series: Special Publication (NIST SP)
Report Number: 800-133
Published: 12/21/2012
Authors: Elaine B Barker, Allen L Roginsky
Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cry ...

16. Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance
Series: ITL Bulletin
Published: 7/10/2012
Authors: Paul Turner, William T Polk, Elaine B Barker
Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certific ...

17. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 3
Published: 7/10/2012
Authors: Elaine B Barker, William Curtis Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: [Superseded by SP 800-57 Part 1 Revision 4 (January 2016): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919831]This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines ...

18. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A
Published: 1/23/2012
Author: Elaine B Barker
Abstract: [Superseded by SP 800-90A Revision 1 (June 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918489] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are ba ...

19. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
Series: Special Publication (NIST SP)
Report Number: 800-67 Rev 1
Published: 1/23/2012
Authors: William Curtis Barker, Elaine B Barker
Abstract: This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2 ...

20. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Series: Special Publication (NIST SP)
Report Number: 800-131A
Published: 1/13/2011
Authors: Elaine B Barker, Allen L Roginsky
Abstract: [Superseded by SP 800-131A Revision 1 (November 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919563] At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing crypto ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series