NIST logo

Publications Portal

You searched on:
Author: elaine barker
Sorted by: title

Displaying records 1 to 10 of 32 records.
Resort by: Date / Title


1. A Framework for Designing Cryptographic Key Management Systems
Series: Special Publication (NIST SP)
Report Number: 800-130
Published: 8/15/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Abstract: This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914228

2. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268

3. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Series: Special Publication (NIST SP)
Report Number: 800-22
Published: 10/1/2000
Authors: Andrew L Rukhin, Juan Soto, James R Nechvatal, Miles E. Smid, Elaine B Barker, Stefan D Leigh, M Levenson, M Vangel, D L. Banks, Nathanael A Heckert, James F Dray Jr, S C. Vo
Abstract: This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151222

4. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Series: ITL Bulletin
Published: 12/20/2000
Author: Elaine B Barker
Abstract: Random and pseudorandom numbers are needed for many cryptographic applications. For example, common cryptosystems employ keys that must be generated in a random fashion. Many cryptographic protocols also require random or pseudorandom inputs at var ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151231

5. Advanced Encryption Standard (AES)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 197
Published: 11/26/2001
Authors: Morris J Dworkin, Elaine B Barker, James R Nechvatal, James Foti, Lawrence E Bassham, E Roback, James F Dray Jr
Abstract: The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901427

6. Cryptographic Key Management Workshop Summary - June 8-9, 2009
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7609
Published: 1/8/2010
Authors: Elaine B Barker, Dennis Keith Branstad, Santosh Chokhani, Miles E. Smid
Abstract: On June 8 and 9, 2009, NIST held a Cryptographic Key Management (CKM) Workshop at its Gaithersburg, Maryland, campus that attracted approximately 80 people attending the workshop in person, with another 75 participating through video conferencing, an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904169

7. Cryptographic Protection for the Twenty-First Century
Published: 3/1/2001
Author: Elaine B Barker
Abstract: In 2000, the National Institute of Standards and Technology (NIST) announced the selection of a new encryption algorithm that will be used to protect sensitive (unclassified) government information. This algorithm, to be proposed as the Advanced Encr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151233

8. Cryptographic Standards and Guidance: A Status Report
Series: ITL Bulletin
Published: 9/1/2002
Author: Elaine B Barker
Abstract: A comprehensive toolkit of cryptographic standards and associated guideline that covers a wide range of cryptographic technology is currently under development by the Computer Security Division at NIST. These standards and guidelines will enable U.S ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51021

9. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-3
Published: 6/25/2009
Author: Elaine B Barker
Abstract: The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984

10. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-4
Published: 7/19/2013
Author: Elaine B Barker
Abstract: This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series