NIST logo

Publications Portal

You searched on: Author: elaine barker

Displaying records 11 to 20 of 47 records.
Resort by: Date / Title

11. Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance
Series: ITL Bulletin
Published: 7/10/2012
Authors: Paul Turner, William T Polk, Elaine B Barker
Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certific ...

12. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 3
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...

13. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A
Published: 1/23/2012
Author: Elaine B Barker
Abstract: [Superseded by SP 800-90A Revision 1 (June 2015):] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are ba ...

14. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
Series: Special Publication (NIST SP)
Report Number: 800-67 Rev 1
Published: 1/23/2012
Authors: William C Barker, Elaine B Barker
Abstract: This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2 ...

15. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Series: Special Publication (NIST SP)
Report Number: 800-131A
Published: 1/13/2011
Authors: Elaine B Barker, Allen L Roginsky
Abstract: At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algor ...

16. Recommendation for Password-Based Key Derivation Part I: Storage Applications
Series: Special Publication (NIST SP)
Report Number: 800-132
Published: 12/22/2010
Authors: Meltem Sonmez Turan, Elaine B Barker, William Edward Burr, Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection keys.

17. Cryptographic Key Management Workshop Summary - June 8-9, 2009
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7609
Published: 1/8/2010
Authors: Elaine B Barker, Dennis Keith Branstad, Santosh Chokhani, Miles E. Smid
Abstract: On June 8 and 9, 2009, NIST held a Cryptographic Key Management (CKM) Workshop at its Gaithersburg, Maryland, campus that attracted approximately 80 people attending the workshop in person, with another 75 participating through video conferencing, an ...

18. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: [Superseded by: SP 800-57 Part 3 Rev. 1 (January 2015):] Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides genera ...

19. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...

20. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: [Superseded by SP 800-56B Rev. 1 (September 2014):] This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establis ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series