NIST logo

Publications Portal

You searched on: Author: elaine barker Sorted by: title

Displaying records 31 to 40 of 45 records.
Resort by: Date / Title


31. Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev
Published: 3/14/2007
Authors: Elaine B Barker, Don Johnson, Miles E. Smid
Abstract: [Superseded by SP 800-56A Rev. 2 (May 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913431] This Recommendation provides the specifications of key establishment schemes that are appropriate for use by the U.S. Federal Government ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150618

32. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

33. Recommendation for Password-Based Key Derivation Part I: Storage Applications
Series: Special Publication (NIST SP)
Report Number: 800-132
Published: 12/22/2010
Authors: Meltem Sonmez Turan, Elaine B Barker, William Edward Burr, Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection keys.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907381

34. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A
Published: 1/23/2012
Author: Elaine B Barker
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910345

35. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-90
Published: 3/14/2007
Authors: Elaine B Barker, John M Kelsey
Abstract: [Superseded by SP 800-90A (January 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910345] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50814

36. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
Series: Special Publication (NIST SP)
Report Number: 800-67 Rev 1
Published: 1/23/2012
Authors: William C Barker, Elaine B Barker
Abstract: This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2 ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910079

37. Report on the Development of the Advanced Encryption Standard (AES)
Series: Journal of Research (NIST JRES)
Published: 6/1/2001
Authors: James R Nechvatal, Elaine B Barker, Lawrence E Bassham, William Edward Burr, Morris J Dworkin, James Foti, E Roback
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibiliti ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151226

38. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180-3
Published: 10/31/2008
Authors: Elaine B Barker, Quynh H Dang
Abstract: [Superseded by FIPS 180-4 (March 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910977] This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether message ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901372

39. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180-1
Published: 4/17/1995
Author: Elaine B Barker
Abstract: [Superseded by FIPS 180-2(August 2002): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917976] This standard specifies a Secure Hash Algorithm (SHA-1) which can be used to generate a condensed representation of a message called a messag ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917977

40. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180
Published: 5/11/1993
Author: Elaine B Barker
Abstract: [Superseded by FIPS 180-1 (April 17, 1995): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917977] This standard specifies a Secure Hash Algorithm (SHA) which can be used to generate a condensed representation of a message called a mess ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917978



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series