NIST logo

Publications Portal

You searched on:
Author: elaine barker
Sorted by: title

Displaying records 11 to 20 of 32 records.
Resort by: Date / Title


11. Guideline for Implementing Cryptography In the Federal Government [Second Edition]
Series: Special Publication (NIST SP)
Report Number: 800-21-1
Published: 12/1/2005
Authors: Elaine B Barker, William C Barker, Ae-kyoung Lee
Abstract: This Second Edition of NIST Special Publication (SP) 800-21, updates and replaces the November 1999 edition of Guideline for Implementing Cryptography in the Federal Government. Many of the references and cryptographic techniques contained in the fir ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150421

12. Message Authentication Code (MAC) Validation System: Requirements and Procedures
Series: Special Publication (NIST SP)
Report Number: 500-156
Published: 5/1/1988
Authors: Miles E. Smid, Elaine B Barker, D Balenson, M Haykin
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900409

13. NIST SP 800-131A: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Series: Special Publication (NIST SP)
Report Number: 800-131
Published: 1/13/2011
Authors: Elaine B Barker, Allen L Roginsky
Abstract: At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907517

14. NIST SP 800-56A: Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-56
Published: 3/14/2007
Authors: Elaine B Barker, Don Johnson, Miles E. Smid
Abstract: This Recommendation provides the specifications of key establishment schemes that are appropriate for use by the U.S. Federal Government, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: American National Standard (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150618

15. NIST SP 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establishment Using Integer Factorization Cryptography, which was developed by the Accredited Standards Committee (ASC) X9, Inc. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903082

16. NIST SP 800-90A: Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90
Published: 1/23/2012
Author: Elaine B Barker
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910345

17. Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance
Series: ITL Bulletin
Published: 7/10/2012
Authors: Paul Turner, William T Polk, Elaine B Barker
Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certific ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911197

18. Recommendation for Cryptographic Key Generation
Series: Special Publication (NIST SP)
Report Number: 800-133
Published: 12/21/2012
Authors: Elaine B Barker, Allen L Roginsky
Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cry ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912496

19. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

20. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series